CVE-2010-0307
Published: 17 February 2010
The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.
From the Ubuntu Security Team
Mathias Krause discovered that the Linux kernel did not correctly handle missing ELF interpreters. A local attacker could exploit this to cause the system to crash, leading to a denial of service.
Notes
Author | Note |
---|---|
jdstrand | commits based on comments from dann frazier <dannf@dannf.org> in oss-security |
Priority
Status
Package | Release | Status |
---|---|---|
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
upstream |
Released
(2.6.33~rc7)
|
dapper |
Released
(2.6.15-55.83)
|
|
hardy |
Does not exist
|
|
intrepid |
Does not exist
|
|
jaunty |
Does not exist
|
|
karmic |
Does not exist
|
|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(2.6.33~rc7)
|
dapper |
Does not exist
|
|
hardy |
Released
(2.6.24-27.68)
|
|
intrepid |
Released
(2.6.27-17.46)
|
|
jaunty |
Released
(2.6.28-18.60)
|
|
karmic |
Released
(2.6.31-20.58)
|
|
Patches: upstream: http://git.kernel.org/linus/221af7f87b97431e3ee21ce4b0e77d5411cf1549 upstream: http://git.kernel.org/linus/7ab02af428c2d312c0cf8fb0b01cc1eb21131a3d upstream: http://git.kernel.org/linus/05d43ed8a89c159ff641d472f970e3f1baa66318 upstream: http://git.kernel.org/linus/94f28da8409c6059135e89ac64a0839993124155 upstream: http://git.kernel.org/linus/94673e968cbcce07fa78dac4b0ae05d24b5816e1 |