CVE-2009-2692

EUVD-2009-2685
The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 94%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
2.4.4 ≤
𝑥
< 2.4.37.5
linuxlinux_kernel
2.6.0 ≤
𝑥
< 2.6.30.5
debiandebian_linux
4.0
redhatenterprise_linux_desktop
4.0
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_eus
4.8
redhatenterprise_linux_eus
5.3
redhatenterprise_linux_server
4.0
redhatenterprise_linux_server
5.0
redhatenterprise_linux_server_aus
5.3
redhatenterprise_linux_workstation
4.0
redhatenterprise_linux_workstation
5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
dapper
dne
hardy
Fixed 2.6.24-24.59
released
intrepid
Fixed 2.6.27-14.39
released
jaunty
Fixed 2.6.28-15.49
released
linux-source-2.6.15
dapper
Fixed 2.6.15-54.79
released
hardy
dne
intrepid
dne
jaunty
dne
References