cve/2009/CVE-2009-1897.md
2024-06-09 00:33:16 +00:00

19 lines
878 B
Markdown

### [CVE-2009-1897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1897)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20n%2Fa%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and 2.6.30.1, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.
### POC
#### Reference
- http://isc.sans.org/diary.html?storyid=6820
- http://isc.sans.org/diary.html?storyid=6820
#### Github
- https://github.com/xairy/linux-kernel-exploitation