~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
Candidate: CVE-2009-2692
PublicDate: 2009-08-14
CRD: 2009-08-13
References: 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692
 http://www.ubuntu.com/usn/usn-819-1
Description:
 The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does
 not initialize all function pointers for socket operations in proto_ops
 structures, which allows local users to trigger a NULL pointer dereference
 and gain privileges by using mmap to map page zero, placing arbitrary code
 on this page, and then invoking an unavailable operation, as demonstrated
 by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
Ubuntu-Description: 
Notes: 
 Ubuntu 8.04 and later have a default setting of 65536 in /proc/sys/vm/mmap_min_addr.  When set, this issue is blocked.  If your value is 0, please purge the "wine" and "dosemu" packages, and reset the value:
  sudo apt-get purge wine dosemu
  echo 65536 | sudo tee /proc/sys/vm/mmap_min_addr
 On Ubuntu 6.06, we recommend the work-around detailed in the linked bug.
Bugs: 
 https://bugs.launchpad.net/bugs/413656
Priority: medium
Discovered-by: Tavis Ormandy and Julien Tinnes
Assigned-to: 

Patches_linux-source-2.6.15:
 upstream: http://git.kernel.org/linus/e694958388c50148389b0e9b9e9e8945cf0f1b98
upstream_linux-source-2.6.15: not-affected
dapper_linux-source-2.6.15: released (2.6.15-54.79)
hardy_linux-source-2.6.15: DNE
intrepid_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE

Patches_linux:
 upstream: http://git.kernel.org/linus/e694958388c50148389b0e9b9e9e8945cf0f1b98
upstream_linux: not-affected
dapper_linux: DNE
hardy_linux: released (2.6.24-24.59)
intrepid_linux: released (2.6.27-14.39)
jaunty_linux: released (2.6.28-15.49)
devel_linux: not-affected (2.6.31-6.25)