1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
|
Candidate: CVE-2009-2692
PublicDate: 2009-08-14
CRD: 2009-08-13
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692
http://www.ubuntu.com/usn/usn-819-1
Description:
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does
not initialize all function pointers for socket operations in proto_ops
structures, which allows local users to trigger a NULL pointer dereference
and gain privileges by using mmap to map page zero, placing arbitrary code
on this page, and then invoking an unavailable operation, as demonstrated
by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
Ubuntu-Description:
Notes:
Ubuntu 8.04 and later have a default setting of 65536 in /proc/sys/vm/mmap_min_addr. When set, this issue is blocked. If your value is 0, please purge the "wine" and "dosemu" packages, and reset the value:
sudo apt-get purge wine dosemu
echo 65536 | sudo tee /proc/sys/vm/mmap_min_addr
On Ubuntu 6.06, we recommend the work-around detailed in the linked bug.
Bugs:
https://bugs.launchpad.net/bugs/413656
Priority: medium
Discovered-by: Tavis Ormandy and Julien Tinnes
Assigned-to:
Patches_linux-source-2.6.15:
upstream: http://git.kernel.org/linus/e694958388c50148389b0e9b9e9e8945cf0f1b98
upstream_linux-source-2.6.15: not-affected
dapper_linux-source-2.6.15: released (2.6.15-54.79)
hardy_linux-source-2.6.15: DNE
intrepid_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE
Patches_linux:
upstream: http://git.kernel.org/linus/e694958388c50148389b0e9b9e9e8945cf0f1b98
upstream_linux: not-affected
dapper_linux: DNE
hardy_linux: released (2.6.24-24.59)
intrepid_linux: released (2.6.27-14.39)
jaunty_linux: released (2.6.28-15.49)
devel_linux: not-affected (2.6.31-6.25)
|