Unrated severityNVD Advisory· Published Mar 25, 2009· Updated Apr 23, 2026
CVE-2009-1072
CVE-2009-1072
Description
nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
Affected products
20- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vcenter_server:4.0:-:*:*:*:*:*:*
cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:vmware:virtualcenter:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:virtualcenter:2.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
28- lists.opensuse.org/opensuse-security-announce/2009-04/msg00007.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.htmlnvdMailing ListThird Party Advisory
- www.debian.org/security/2009/dsa-1800nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2009/03/23/1nvdMailing ListThird Party Advisory
- www.securityfocus.com/archive/1/507985/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/34205nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-793-1nvdThird Party Advisory
- www.vmware.com/security/advisories/VMSA-2009-0016.htmlnvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/49356nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10314nvdThird Party Advisory
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8382nvdThird Party Advisory
- secunia.com/advisories/34422nvdBroken Link
- secunia.com/advisories/34432nvdBroken Link
- secunia.com/advisories/34786nvdBroken Link
- secunia.com/advisories/35121nvdBroken Link
- secunia.com/advisories/35185nvdBroken Link
- secunia.com/advisories/35343nvdBroken Link
- secunia.com/advisories/35390nvdBroken Link
- secunia.com/advisories/35394nvdBroken Link
- secunia.com/advisories/35656nvdBroken Link
- secunia.com/advisories/37471nvdBroken Link
- thread.gmane.org/gmane.linux.kernel/805280nvdBroken Link
- www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.9nvdBroken Link
- www.redhat.com/support/errata/RHSA-2009-1081.htmlnvdBroken Link
- www.vupen.com/english/advisories/2009/0802nvdBroken Link
- www.vupen.com/english/advisories/2009/3316nvdBroken Link
News mentions
0No linked articles in our index yet.