First published: Thu Apr 09 2009(Updated: )
A privilege escalation flaw was found in the way udev used to check for the origin of messages sent from the NETLINK service. An attacker could use this flaw to escalate his privileges by sending the NETLINK message from userspace process, instead of from the kernel. Acknowledgements: Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for responsibly reporting this flaw.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Udev Project Udev | <141 | |
SUSE Linux Enterprise Debuginfo | =10-sp2 | |
SUSE Linux Enterprise Debuginfo | =11 | |
openSUSE openSUSE | =10.3 | |
openSUSE openSUSE | =11.0 | |
openSUSE openSUSE | =11.1 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
SUSE Linux Enterprise Desktop | =11 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =11 | |
Debian Debian Linux | =4.0 | |
Debian Debian Linux | =5.0 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =7.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =8.10 | |
Fedoraproject Fedora | =9 | |
Fedoraproject Fedora | =10 | |
Juniper Ctpview | <7.1 | |
Juniper Ctpview | =7.1 | |
Juniper Ctpview | =7.1-r1 | |
Juniper Ctpview | =7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.