Vulnerabilities > CVE-2009-2768 - NULL Pointer Dereference vulnerability in Linux Kernel
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
The load_flat_shared_library function in fs/binfmt_flat.c in the flat subsystem in the Linux kernel before 2.6.31-rc6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by executing a shared flat binary, which triggers an access of an "uninitialized cred pointer."
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Seebug
bulletinFamily | exploit |
description | BUGTRAQ ID: 36037 CVE(CAN) ID: CVE-2009-2768 Linux Kernel是开放源码操作系统Linux所使用的内核。 Linux Kernel的flat子系统中fs/binfmt_flat.c文件的load_flat_shared_library函数存在空指针应用错误。如果本地用户执行了共享的flat二进制程序的话,就可以触发这个错误,导致系统崩溃。 Linux kernel 2.6.x 厂商补丁: Linux ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=3440625d78711bee41a84cf29c3d8c579b522666 |
id | SSV:12067 |
last seen | 2017-11-19 |
modified | 2009-08-18 |
published | 2009-08-18 |
reporter | Root |
title | Linux Kernel binfmt_flat.c空指针引用拒绝服务漏洞 |
Statements
contributor | Mark J Cox |
lastmodified | 2009-08-18 |
organization | Red Hat |
statement | Not vulnerable. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5 or Red Hat Enterprise MRG. Red Hat does not provide support for flat binary support, and additionally this issue only affected kernels version 2.6.29-rc1 and later. |
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3440625d78711bee41a84cf29c3d8c579b522666
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3440625d78711bee41a84cf29c3d8c579b522666
- http://lkml.org/lkml/2009/6/22/91
- http://lkml.org/lkml/2009/6/22/91
- http://secunia.com/advisories/36278
- http://secunia.com/advisories/36278
- http://thread.gmane.org/gmane.linux.hardware.blackfin.kernel.devel/1905
- http://thread.gmane.org/gmane.linux.hardware.blackfin.kernel.devel/1905
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.30.5
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc6
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:051
- http://www.openwall.com/lists/oss-security/2009/08/13/1
- http://www.openwall.com/lists/oss-security/2009/08/13/1
- http://www.securityfocus.com/bid/36037
- http://www.securityfocus.com/bid/36037
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52909
- https://exchange.xforce.ibmcloud.com/vulnerabilities/52909