CVE-2009-2692

The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
VendorProductVersion
linuxlinux_kernel
2.4.4 ≤
𝑥
< 2.4.37.5
linuxlinux_kernel
2.6.0 ≤
𝑥
< 2.6.30.5
debiandebian_linux
4.0
redhatenterprise_linux_desktop
4.0
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_eus
4.8
redhatenterprise_linux_eus
5.3
redhatenterprise_linux_server
4.0
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server_aus
5.3
redhatenterprise_linux_workstation
4.0
redhatenterprise_linux_workstation
5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
jaunty
Fixed 2.6.28-15.49
released
intrepid
Fixed 2.6.27-14.39
released
hardy
Fixed 2.6.24-24.59
released
dapper
dne
linux-source-2.6.15
jaunty
dne
intrepid
dne
hardy
dne
dapper
Fixed 2.6.15-54.79
released
References