Bug 518273

Summary: Vulnerability in kernel: NULL pointer dereference in load_flat_shared_library()
Product: Red Hat Enterprise Linux 5 Reporter: Ethan Baker <bakere>
Component: kernelAssignee: Red Hat Kernel Manager <kernel-mgr>
Status: CLOSED NOTABUG QA Contact: Red Hat Kernel QE team <kernel-qe>
Severity: medium Docs Contact:
Priority: low    
Version: 5.3CC: mjc, security-response-team
Target Milestone: rc   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2009-08-19 20:51:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Ethan Baker 2009-08-19 17:19:44 UTC
Description of problem:
A NULL pointer dereference exists within the "load_flat_shared_library()" function in fs/binfmt_flat.c, which can be exploited to cause a crash and potentially execute arbitrary code with root privileges. (Quoted
from Secunia)

Version-Release number of selected component (if applicable):
ALL

Please refer to the following article. This concerns issue (3):

http://secunia.com/advisories/36278/

Comment 1 Mark J. Cox 2009-08-19 20:51:00 UTC
This is CVE-2009-2768 (and also duplicated as CVE-2009-2845)

Not vulnerable. This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5 or Red Hat Enterprise MRG. Red Hat does not provide support for flat binary support, and additionally this issue only affected kernels version 2.6.29-rc1 and later. 

http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-2768