SB2009081403 - Privilege escalation in Linux kernel
Published: August 14, 2009 Updated: June 13, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Access of Uninitialized Pointer (CVE-ID: CVE-2009-2768)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to access to uninitialized pointer within the load_flat_shared_library() function in fs/binfmt_flat.c. A local user can execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.
References
- http://www.securityfocus.com/bid/36037
- http://lkml.org/lkml/2009/6/22/91
- http://thread.gmane.org/gmane.linux.hardware.blackfin.kernel.devel/1905
- http://www.openwall.com/lists/oss-security/2009/08/13/1
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5
- http://secunia.com/advisories/36278
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52909
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3440625d78711bee41a84cf29c3d8c579b522666