First published: Wed Dec 08 2010(Updated: )
Sebastian Krahmer reported that the udisks service (via D-BUS) could be used to load arbitrary Linux kernel modules. Since "mount -t $NAME" is called, this also triggers a "modprobe -q -- $NAME" which will load the Linux kernel module from /lib/modules/. The upstream bug report is: <a href="https://bugs.freedesktop.org/show_bug.cgi?id=32232">https://bugs.freedesktop.org/show_bug.cgi?id=32232</a> and no upstream fix has been made as of yet, although the upstream bug report has a few suggestions on how to correct this.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/udisks | <1.0.3 | 1.0.3 |
debian/udisks | ||
udisks project udisks | <1.0.3 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | ||
openSUSE | =11.3 | |
openSUSE | =11.4 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-4661 is high.
CVE-2010-4661 allows a local user to load arbitrary Linux kernel modules using udisks before version 1.0.3.
Versions up to and excluding udisks 1.0.3, Redhat Enterprise Linux 6.0, Debian Linux 8.0, Opensuse 11.4, Fedoraproject Fedora, and Opensuse 11.3 are affected.
Upgrade udisks to version 1.0.3 or apply the appropriate security patches provided by the software vendor.
You can find more information about CVE-2010-4661 at the following references: http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00000.html, https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4661, https://access.redhat.com/security/cve/cve-2010-4661.