Bug 518034 (CVE-2009-2698) - CVE-2009-2698 kernel: udp socket NULL ptr dereference
Summary: CVE-2009-2698 kernel: udp socket NULL ptr dereference
Status: CLOSED ERRATA
Alias: CVE-2009-2698
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
(Show other bugs)
Version: unspecified
Hardware: All Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,source=vendorsec,rep...
Keywords: Security
Depends On: 518040 518041 518042 518043 518044 518047 519701 519703
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-08-18 14:53 UTC by Mark J. Cox
Modified: 2016-06-10 22:31 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-06-10 22:31:51 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2009:1222 normal SHIPPED_LIVE Important: kernel security and bug fix update 2009-08-24 08:12:06 UTC
Red Hat Product Errata RHSA-2009:1223 normal SHIPPED_LIVE Important: kernel security update 2009-08-24 08:29:22 UTC
Red Hat Product Errata RHSA-2009:1233 normal SHIPPED_LIVE Important: kernel security update 2009-08-27 20:01:42 UTC
Red Hat Product Errata RHSA-2009:1457 normal SHIPPED_LIVE Important: kernel security update 2009-09-22 14:56:10 UTC
Red Hat Product Errata RHSA-2009:1469 normal SHIPPED_LIVE Important: kernel security update 2009-09-30 14:58:38 UTC

Description Mark J. Cox 2009-08-18 14:53:06 UTC
Tavis Ormandy and Julien Tinnes, Google Security Team reported that Kernels <= 2.6.18.8 are vulnerable to a NULL pointer dereference issue when using MSG_MORE on udp sockets.

Fixed upstream already by:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=1e0c14f49d6b393179f423abbac47f85618d3d46

Acknowledgements:

Red Hat would like to thank Tavis Ormandy and Julien Tinnes of the Google
Security Team for responsibly reporting this flaw.

Comment 6 errata-xmlrpc 2009-08-24 08:12:38 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1222 https://rhn.redhat.com/errata/RHSA-2009-1222.html

Comment 7 errata-xmlrpc 2009-08-24 08:29:52 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2009:1223 https://rhn.redhat.com/errata/RHSA-2009-1223.html

Comment 8 errata-xmlrpc 2009-08-27 20:02:16 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 3

Via RHSA-2009:1233 https://rhn.redhat.com/errata/RHSA-2009-1233.html

Comment 9 errata-xmlrpc 2009-09-22 14:58:19 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5.2 Z Stream

Via RHSA-2009:1457 https://rhn.redhat.com/errata/RHSA-2009-1457.html

Comment 10 errata-xmlrpc 2009-09-30 14:59:16 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4.7 Z Stream

Via RHSA-2009:1469 https://rhn.redhat.com/errata/RHSA-2009-1469.html


Note You need to log in before you can comment on or make changes to this bug.