CVE-2009-1897

Linux kernel 2.6.30-2.6.30.1 - Privilege Escalation

Title source: llm

Description

The tun_chr_poll function in drivers/net/tun.c in the tun subsystem in the Linux kernel 2.6.30 and 2.6.30.1, when the -fno-delete-null-pointer-checks gcc option is omitted, allows local users to gain privileges via vectors involving a NULL pointer dereference and an mmap of /dev/net/tun, a different vulnerability than CVE-2009-1894.

Exploits (2)

exploitdb WRITEUP VERIFIED
by Christian Borntraeger · textdoslinux
https://www.exploit-db.com/exploits/33088
exploitdb WORKING POC VERIFIED
by spender · textlocallinux
https://www.exploit-db.com/exploits/9191

Scores

EPSS 0.0171
EPSS Percentile 82.1%

Classification

CWE
CWE-119
Status draft

Affected Products (9)

linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel
linux/linux_kernel

Timeline

Published Jul 20, 2009
Tracked Since Feb 18, 2026