A privilege escalation flaw was found in the way udev used to check for the origin of messages sent from the NETLINK service. An attacker could use this flaw to escalate his privileges by sending the NETLINK message from userspace process, instead of from the kernel. Acknowledgements: Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for responsibly reporting this flaw.
Upstream commits: http://git.kernel.org/?p=linux/hotplug/udev.git;a=commitdiff;h=e2b362d9f23d4c63018709ab5f81a02f72b91e75 http://git.kernel.org/?p=linux/hotplug/udev.git;a=commitdiff;h=e86a923d508c2aed371cdd958ce82489cf2ab615
udev-124-3.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/udev-124-3.fc9
udev-127-4.fc10 has been submitted as an update for Fedora 10. http://admin.fedoraproject.org/updates/udev-127-4.fc10
udev-124-4.fc9 has been submitted as an update for Fedora 9. http://admin.fedoraproject.org/updates/udev-124-4.fc9
udev-124-4.fc9 has been pushed to the Fedora 9 stable repository. If problems still persist, please make note of it in this bug report.
udev-127-5.fc10 has been pushed to the Fedora 10 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:0427 https://rhn.redhat.com/errata/RHSA-2009-0427.html
This issue did not affect the versions of udev as shipped with Red Hat Enterprise Linux 4. Issue was fixed upstream in version 141.