First published: Thu Apr 09 2009(Updated: )
A privilege escalation flaw was found in the way udev used to check for the origin of messages sent from the NETLINK service. An attacker could use this flaw to escalate his privileges by sending the NETLINK message from userspace process, instead of from the kernel. Acknowledgements: Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for responsibly reporting this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
udev project udev | <141 | |
SUSE Linux Enterprise Debuginfo | =10-sp2 | |
SUSE Linux Enterprise Debuginfo | =11 | |
openSUSE | =10.3 | |
openSUSE | =11.0 | |
openSUSE | =11.1 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp2 | |
SUSE Linux Enterprise Desktop with Beagle | =11 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =11 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =5.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Fedoraproject Fedora | =9 | |
Fedoraproject Fedora | =10 | |
juniper ctpview | <7.1 | |
juniper ctpview | =7.1 | |
juniper ctpview | =7.1-r1 | |
juniper ctpview | =7.2 | |
Debian | =5.0 | |
Debian | =4.0 | |
Ubuntu | =7.10 | |
Ubuntu | =8.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 | |
Fedora | =10 | |
Fedora | =9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1185 is classified as a privilege escalation vulnerability.
To fix CVE-2009-1185, update the affected software to the latest patched version.
CVE-2009-1185 affects various versions of udev, SUSE Linux, Debian, Ubuntu, and Fedora.
The impact of CVE-2009-1185 allows attackers to escalate their privileges on the affected systems.
There is no specific workaround for CVE-2009-1185; updating the software is the recommended solution.