Local root exploit via CVE-2009-2692 (incorrect proto_ops initializations)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Fedora) |
Fix Released
|
High
|
|||
linux (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Fix Released
|
Medium
|
Unassigned | ||
Intrepid |
Fix Released
|
Medium
|
Unassigned | ||
Jaunty |
Fix Released
|
Medium
|
Unassigned | ||
Karmic |
Fix Released
|
Medium
|
Unassigned | ||
linux-source-2.6.15 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
Medium
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
Intrepid |
Invalid
|
Undecided
|
Unassigned | ||
Jaunty |
Invalid
|
Undecided
|
Unassigned | ||
Karmic |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: linux-image-
CVE Candidate is CVE-2009-2692
Exploit:
http://
Patch:
WORK-AROUND:
Ubuntu 8.04 and later have a default setting of 65536 in /proc/sys/
sudo apt-get purge wine dosemu
echo 65536 | sudo tee /proc/sys/
On Ubuntu 6.06 (Dapper), the following configuration will work around the issue (note this disables IPv6):
sudo -s
cat > /etc/modprobe.
install ppp_generic /bin/true
install pppoe /bin/true
install pppox /bin/true
install slhc /bin/true
install bluetooth /bin/true
install ipv6 /bin/true
install irda /bin/true
install ax25 /bin/true
install x25 /bin/true
install ipx /bin/true
install appletalk /bin/true
EOM
/etc/init.
rmmod pppoe pppox ppp_generic slhc ax25 x25 irda crc_ccitt ipx ipv6 appletalk rfcomm l2cap bluetooth
Changed in linux-source-2.6.15 (Ubuntu Dapper): | |
status: | New → Triaged |
Changed in linux-source-2.6.15 (Ubuntu Hardy): | |
status: | New → Invalid |
Changed in linux-source-2.6.15 (Ubuntu Jaunty): | |
status: | New → Invalid |
Changed in linux-source-2.6.15 (Ubuntu Karmic): | |
status: | New → Invalid |
Changed in linux-source-2.6.15 (Ubuntu Intrepid): | |
status: | New → Invalid |
Changed in linux (Ubuntu Dapper): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Hardy): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Karmic): | |
importance: | Undecided → Medium |
Changed in linux-source-2.6.15 (Ubuntu Intrepid): | |
importance: | Undecided → Medium |
Changed in linux-source-2.6.15 (Ubuntu Dapper): | |
importance: | Undecided → Medium |
Changed in linux-source-2.6.15 (Ubuntu Karmic): | |
importance: | Undecided → Medium |
Changed in linux-source-2.6.15 (Ubuntu Hardy): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Hardy): | |
status: | New → Triaged |
Changed in linux-source-2.6.15 (Ubuntu Jaunty): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Karmic): | |
status: | New → Triaged |
Changed in linux (Ubuntu Jaunty): | |
status: | New → Triaged |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Dapper): | |
status: | New → Invalid |
Changed in linux (Ubuntu Intrepid): | |
importance: | Undecided → Medium |
status: | New → Triaged |
Changed in linux-source-2.6.15 (Ubuntu Hardy): | |
importance: | Medium → Undecided |
Changed in linux-source-2.6.15 (Ubuntu Jaunty): | |
importance: | Medium → Undecided |
Changed in linux (Ubuntu Dapper): | |
importance: | Medium → Undecided |
Changed in linux-source-2.6.15 (Ubuntu Intrepid): | |
importance: | Medium → Undecided |
Changed in linux-source-2.6.15 (Ubuntu Karmic): | |
importance: | Medium → Undecided |
Changed in linux (Fedora): | |
status: | Unknown → Confirmed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in linux (Ubuntu Karmic): | |
status: | Triaged → Fix Released |
Changed in linux (Fedora): | |
importance: | Unknown → High |
status: | Confirmed → Fix Released |
Description of problem:
Reported by Tavis Ormandy and Julien Tinnes. The SOCKOPS_WRAP macro from include/linux/net.h doesn't initialise the sendpage operation in the proto_ops structure correctly. Leading to a kernel NULL pointer dereference, and thus a local privilege escalation.
Acknowledgements:
Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google
Security Team for responsibly reporting this flaw.