Your submission was sent successfully! Close

CVE-2010-0307

Published: 17 February 2010

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.

From the Ubuntu security team

Mathias Krause discovered that the Linux kernel did not correctly handle missing ELF interpreters. A local attacker could exploit this to cause the system to crash, leading to a denial of service.

Notes

AuthorNote
jdstrand
commits based on comments from dann frazier <dannf@dannf.org> in
oss-security
Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy
Released (2.6.24-27.68)
intrepid
Released (2.6.27-17.46)
jaunty
Released (2.6.28-18.60)
karmic
Released (2.6.31-20.58)
upstream
Released (2.6.33~rc7)
Patches:
upstream: http://git.kernel.org/linus/221af7f87b97431e3ee21ce4b0e77d5411cf1549
upstream: http://git.kernel.org/linus/7ab02af428c2d312c0cf8fb0b01cc1eb21131a3d
upstream: http://git.kernel.org/linus/05d43ed8a89c159ff641d472f970e3f1baa66318
upstream: http://git.kernel.org/linus/94f28da8409c6059135e89ac64a0839993124155
upstream: http://git.kernel.org/linus/94673e968cbcce07fa78dac4b0ae05d24b5816e1
linux-source-2.6.15
Launchpad, Ubuntu, Debian
dapper
Released (2.6.15-55.83)
hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

upstream
Released (2.6.33~rc7)