Loading...
Loading...
The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
August 18, 2009
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2009-2848
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.