SB2009101305 - NULL pointer dereference in Linux kernel
Published: October 13, 2009
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2009-2908)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The d_delete function in fs/ecryptfs/inode.c in eCryptfs in the Linux kernel 2.6.31 allows local users to cause a denial of service (kernel OOPS) and possibly execute arbitrary code via unspecified vectors that cause a 'negative dentry' and trigger a NULL pointer dereference, as demonstrated via a Mutt temporary directory in an eCryptfs mount.
Remediation
Install update from vendor's website.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=527534
- http://www.openwall.com/lists/oss-security/2009/10/06/1
- http://www.securityfocus.com/bid/36639
- https://bugs.launchpad.net/ecryptfs/+bug/387073
- https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00483.html
- http://secunia.com/advisories/37075
- https://rhn.redhat.com/errata/RHSA-2009-1548.html
- http://lists.vmware.com/pipermail/security-announce/2010/000082.html
- http://www.vupen.com/english/advisories/2010/0528
- http://secunia.com/advisories/38794
- http://secunia.com/advisories/38834
- http://secunia.com/advisories/37105
- http://www.ubuntu.com/usn/USN-852-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/53693
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6992
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10216
- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.31.y.git%3Ba=commit%3Bh=afc2b6932f48f200736d3e36ad66fee0ec733136