Rapid7 Vulnerability & Exploit Database

RHSA-2009:0427: udev security update

Back to Search

RHSA-2009:0427: udev security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
04/17/2009
Created
07/25/2018
Added
09/12/2009
Modified
07/04/2017

Description

udev provides a user-space API and implements a dynamic device directory,providing only the devices present on the system. udev replaces devfs inorder to provide greater hot plug functionality. Netlink is a datagramoriented service, used to transfer information between kernel modules anduser-space processes.It was discovered that udev did not properly check the origin of Netlinkmessages. A local attacker could use this flaw to gain root privileges viaa crafted Netlink message sent to udev, causing it to create aworld-writable block device file for an existing system block device (forexample, the root file system). (CVE-2009-1185)Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team forresponsibly reporting this flaw.Users of udev are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing theupdate, the udevd daemon will be restarted automatically.

Solution(s)

  • redhat-upgrade-libvolume_id
  • redhat-upgrade-libvolume_id-devel
  • redhat-upgrade-udev

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;