SuSE: 2009-025: udev local root exploit Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Announcement
Package: udev
Announcement ID: SUSE-SA:2009:025
Date: Wed, 22 Apr 2009 16:00:00 +0000
Affected Products: SUSE Linux Enterprise Desktop 10 SP2
SUSE Linux Enterprise 10 SP2 DEBUGINFO
SUSE Linux Enterprise Server 10 SP2
Vulnerability Type: local privilege escalation
Severity (1-10): 7
SUSE Default Package: yes
Cross-References: CVE-2009-1185 SUSE-SA:2009:020
Content of This Advisory:
1) Security Vulnerability Resolved:
udev local root exploit - SLE 10 sp2 respin
Problem Description
2) Solution or Work-Around
3) Special Instructions and Notes
4) Package Location and Checksums
5) Pending Vulnerabilities, Solutions, and Work-Arounds:
See SUSE Security Summary Report.
6) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Problem Description and Brief Discussion
This update fixes a local privilege escalation in udev. We previously
released these updates and the advisory as SUSE-SA:2009:020 on
April 16.
Due to a mistake the patch fixing the security problem was not
applied to the udev package, and we did not spot this during the
release process due to use of a not fully functional proof of concept
exploit in QA.
Only SUSE Linux Enterprise 10 SP2 was missing the patch, the updated
udev packages of other products released on April 16 contain the fix.
The issue fixed:
CVE-2009-1185: udev did not check the origin of the netlink messages. A
local attacker could fake device create events and so gain root
privileges.
We thank SGI for reporting the missing patch problem to us.
2) Solution or Work-Around
There is no known workaround, please install the update packages.
3) Special Instructions and Notes
Please restart the udevd after applying the update, by doing:
/etc/init.d/boot.udev restart
Alternatively you can reboot the machine to be sure.
4) Package Location and Checksums
The preferred method for installing security updates is to use the YaST
Online Update (YOU) tool. YOU detects which updates are required and
automatically performs the necessary steps to verify and install them.
Alternatively, download the update packages for your distribution manually
and verify their integrity by the methods listed in Section 6 of this
announcement. Then install the packages using the command
rpm -Fhv
References