The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Linux kernel: NULL dereference via r128

Synthesis of the vulnerability 

A local attacker can use an ioctl on an ATI Rage 128 video device, in order to stop the kernel or to execute privileged code.
Impacted systems: Debian, Fedora, Linux, Mandriva Linux, NLD, openSUSE, RHEL, SLES, ESX, ESXi.
Severity of this alert: 2/4.
Creation date: 19/10/2009.
Références of this alert: BID-36824, CERTA-2002-AVI-244, CVE-2009-3620, DSA-1927-1, DSA-1928-1, FEDORA-2009-11032, FEDORA-2009-11038, MDVSA-2010:088, MDVSA-2010:188, MDVSA-2010:198, RHSA-2009:1540-01, RHSA-2009:1670-01, RHSA-2009:1671-01, RHSA-2010:0882-01, SUSE-SA:2009:060, SUSE-SA:2009:061, SUSE-SA:2009:064, SUSE-SA:2010:012, SUSE-SA:2010:013, SUSE-SU-2011:0928-1, VIGILANCE-VUL-9101, VMSA-2010-0004, VMSA-2010-0004.1, VMSA-2010-0004.2, VMSA-2010-0004.3, VMSA-2010-0009, VMSA-2010-0009.1.

Description of the vulnerability 

Files located in the drivers/gpu/drm/r128 directory implement the DRM support for ATI Rage 128 video devices.

The r128_cce.c file implements the access to the CCE (Concurrent Command Engine) contained in these video devices. However, if some functions are called via an ioctl, without previously initializing the CCE state, a NULL pointer is dereferenced.

A local attacker can therefore use an ioctl on an ATI Rage 128 video device, in order to stop the kernel.

An attacker can also use this vulnerability with VIGILANCE-VUL-8953/VIGILANCE-VUL-8861 in order to elevate his privileges.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity bulletin impacts software or systems such as Debian, Fedora, Linux, Mandriva Linux, NLD, openSUSE, RHEL, SLES, ESX, ESXi.

Our Vigil@nce team determined that the severity of this cybersecurity weakness is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

An attacker with a expert ability can exploit this computer vulnerability bulletin.

Solutions for this threat 

Linux kernel: version 2.4.37.7.
Version 2.4.37.7 is corrected:
  http://www.kernel.org/pub/linux/kernel/v2.4/

Linux kernel: patch for r128.
A patch is available in information sources.

Debian: new linux-2.6.24 packages.
New packages are available:
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-*_2.6.24-6~etchnhalf.9etch1_*.deb

Debian: new linux-2.6.26 packages.
New packages are available:
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-*_2.6.26-19lenny2_*.deb

Fedora 10: new kernel-2.6.27.38 packages.
New packages are available:
  kernel-2.6.27.38-170.2.113.fc10

Fedora 11: new kernel-2.6.30.9 packages.
New packages are available:
  Fedora 11: kernel-2.6.30.9 96.fc11

Fedora 11: new kernel packages.
New packages are available:
  kernel-2.6.30.9-90.fc11

Mandriva 2009.0: new kernel packages.
New packages are available:
  Mandriva Linux 2009.0: kernel-2.6.27.53-1mnb2

Mandriva 2010.0: new kernel packages.
New packages are available:
  Mandriva Linux 2010.0: kernel-kernel-2.6.31.13-1mnb2

Mandriva 2010.1, MES 5: new kernel packages.
New packages are available:
  Mandriva Linux 2010.1: kernel-2.6.33.7-2mnb-1-1mnb2
  Mandriva Enterprise Server 5: kernel-2.6.27.53-1mnb-1-1mnb2

openSUSE 11.0: new kernel packages.
New packages are available:
  http://download.opensuse.org/update/11.0/rpm/i586/kernel-*-2.6.25.20-0.6.i586.rpm

RHEL 3: new kernel packages.
New packages are available:
  kernel-2.4.21-66.EL

RHEL 4: new kernel packages.
New packages are available:
  kernel-2.6.9-89.0.18.EL

RHEL 5 MRG: new kernel-rt packages.
New packages are available:
MRG Realtime for RHEL 5 Server:
  kernel-rt-2.6.24.7-137.el5rt

RHEL 5: new kernel packages.
New packages are available:
  kernel-2.6.18-164.9.1.el5

SUSE LE 10: new kernel packages.
New packages are available, as indicated in information sources.

SUSE LE 9: new kernel packages (23/08/2011).
New packages are available:
http://download.novell.com/patch/finder/?keywords=c05dae2ea95bb787f18166cf12f585e3

SUSE: new kernel packages (02/12/2009).
New packages are available in information sources.

SUSE SLE 10: new kernel packages.
New packages are available, as indicated in information sources.

SUSE SLE 9, POS 9: new kernel packages.
New packages are available, as indicated in information sources.

VMware ESX, ESXi: patch.
A patch is available:
ESXi 4.0 :
  http://bit.ly/bjWeCV
  http://kb.vmware.com/kb/1021041
ESX 4.0 :
  http://bit.ly/aqTCqn
  http://kb.vmware.com/kb/1013127
ESXi 3.5 :
  http://download3.vmware.com/software/vi/ESXe350-201006401-O-SG.zip
  http://kb.vmware.com/kb/1020052
ESX 3.5 :
  http://download3.vmware.com/software/vi/ESX350-201006408-SG.zip
  http://kb.vmware.com/kb/1020172
  http://download3.vmware.com/software/vi/ESX350-201006405-SG.zip
  http://kb.vmware.com/kb/1020169
  http://download3.vmware.com/software/vi/ESX350-201006406-SG.zip
  http://kb.vmware.com/kb/1020170

VMware ESX: patch.
A patch is available:
ESX 4.0 :
  https://hostupdate.vmware.com/software/VUM/OFFLINE/release-192-20100228-732240/ESX400-201002001.zip
  http://kb.vmware.com/kb/1018403
  http://bit.ly/aqTCqn
  http://kb.vmware.com/kb/1013127
ESX 3.5 :
  http://download3.vmware.com/software/vi/ESX350-201006407-SG.zip
  http://kb.vmware.com/kb/1020171
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a systems vulnerabilities watch. The technology watch team tracks security threats targeting the computer system.