CVE-2011-1019

Published: 10 March 2011

The dev_load function in net/core/dev.c in the Linux kernel before 2.6.38 allows local users to bypass an intended CAP_SYS_MODULE capability requirement and load arbitrary modules by leveraging the CAP_NET_ADMIN capability.

From the Ubuntu security team

Vasiliy Kulikov discovered that the CAP_SYS_MODULE capability was not needed to load kernel modules. A local attacker with the CAP_NET_ADMIN capability could load existing kernel modules, possibly increasing the attack surface available on the system.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
Patches:
Introduced by a8f80e8ff94ecba629542d9b4b5f5a8ee3eb565c
Fixed by 8909c9ad8ff03611c9c96c9a92656213e4bb495b
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)