First published: Fri Nov 06 2009(Updated: )
The connector layer in the Linux kernel before 2.6.31.5 does not require the CAP_SYS_ADMIN capability for certain interaction with the (1) uvesafb, (2) pohmelfs, (3) dst, or (4) dm subsystem, which allows local users to bypass intended access restrictions and gain privileges via calls to functions in these subsystems.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <2.6.31.5 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu | =6.06 | |
Ubuntu | =9.04 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3725 is rated as a high severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2009-3725, update the Linux kernel to version 2.6.31.5 or later.
CVE-2009-3725 affects Linux kernel versions prior to 2.6.31.5.
Local users of affected Linux systems can exploit CVE-2009-3725 to gain elevated privileges.
Distributions like Ubuntu Linux versions 6.06, 8.04, 8.10, 9.04, and 9.10 are vulnerable to CVE-2009-3725.