The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Linux kernel: denial of service via a Unix socket

Synthesis of the vulnerability 

A local attacker can use a partially closed Unix socket, in order to lock the system.
Vulnerable products: Debian, Fedora, Linux, Mandriva Linux, NLD, openSUSE, RHEL, SLES, ESX, ESXi.
Severity of this weakness: 1/4.
Creation date: 19/10/2009.
Références of this bulletin: BID-36723, CERTA-2002-AVI-244, CVE-2009-3621, DSA-1927-1, DSA-1928-1, DSA-1929-1, FEDORA-2009-11032, FEDORA-2009-11038, FEDORA-2009-13098, MDVSA-2009:301, MDVSA-2009:329, RHSA-2009:1540-01, RHSA-2009:1670-01, RHSA-2009:1671-01, SUSE-SA:2009:060, SUSE-SA:2009:061, SUSE-SA:2009:064, SUSE-SA:2010:001, SUSE-SA:2010:012, SUSE-SA:2010:013, SUSE-SU-2011:0928-1, VIGILANCE-VUL-9102, VMSA-2010-0004, VMSA-2010-0004.1, VMSA-2010-0004.2, VMSA-2010-0004.3, VMSA-2010-0009, VMSA-2010-0009.1.

Description of the vulnerability 

Unix sockets are for example used by two processes to exchange data, by connecting to a special file. If the filename starts with a null byte ('\0'), the file is not stored on the filesystem, but it uses an abstract space in the kernel.

The shutdown() function is used to close an action (read/write) on the socket.

When a Unix socket uses the abstract space, and is closed with shutdown(), a local attacker can connect to this socket, before the call to close(). However, as it is partially closed, an infinite loop occurs in the kernel.

A local attacker can therefore use a partially closed Unix socket, in order to lock the system.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer threat alert impacts software or systems such as Debian, Fedora, Linux, Mandriva Linux, NLD, openSUSE, RHEL, SLES, ESX, ESXi.

Our Vigil@nce team determined that the severity of this weakness announce is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this computer weakness bulletin.

Solutions for this threat 

Linux kernel: version 2.6.32.
Version 2.6.32 is corrected:
  http://www.kernel.org/pub/linux/kernel/v2.6/

Linux kernel: version 2.6.31.6.
Version 2.6.31.6 is corrected:
  http://www.kernel.org/pub/linux/kernel/v2.6/

Linux kernel: version 2.6.27.39.
Version 2.6.27.39 is corrected:
  http://www.kernel.org/pub/linux/kernel/v2.6/

Linux kernel: version 2.4.37.7.
Version 2.4.37.7 is corrected:
  http://www.kernel.org/pub/linux/kernel/v2.4/

Linux kernel: patch for Unix socket.
A patch is available in information sources.

Debian: new linux-2.6.18 packages.
New packages are available:
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-*_2.6.18.dfsg.1-26etch1_*.deb

Debian: new linux-2.6.24 packages.
New packages are available:
  http://security.debian.org/pool/updates/main/l/linux-2.6.24/linux-*_2.6.24-6~etchnhalf.9etch1_*.deb

Debian: new linux-2.6.26 packages.
New packages are available:
  http://security.debian.org/pool/updates/main/l/linux-2.6/linux-*_2.6.26-19lenny2_*.deb

Fedora 10: new kernel-2.6.27.38 packages.
New packages are available:
  kernel-2.6.27.38-170.2.113.fc10

Fedora 10: new kernel packages.
New packages are available:
  kernel-2.6.27.41-170.2.117.fc10

Fedora 11: new kernel-2.6.30.9 packages.
New packages are available:
  Fedora 11: kernel-2.6.30.9 96.fc11

Mandriva ES 5: new kernel packages.
New packages are available:
  kernel-2.6.27.39-1mnb-1-1mnb2

Mandriva: new kernel packages.
New packages are available:
Mandriva Linux 2009.1:
  kernel-2.6.29.6-3mnb2
Mandriva Linux 2010.0:
  kernel-2.6.31.6-1mnb2

openSUSE 11.0: new kernel packages.
New packages are available:
  http://download.opensuse.org/update/11.0/rpm/i586/kernel-*-2.6.25.20-0.6.i586.rpm

openSUSE 11.2: new kernel packages (08/01/2010).
New packages are available:
  kernel-*-2.6.31.8-0.1.1

RHEL 4: new kernel packages.
New packages are available:
  kernel-2.6.9-89.0.18.EL

RHEL 5 MRG: new kernel-rt packages.
New packages are available:
MRG Realtime for RHEL 5 Server:
  kernel-rt-2.6.24.7-137.el5rt

RHEL 5: new kernel packages.
New packages are available:
  kernel-2.6.18-164.9.1.el5

SUSE LE 10: new kernel packages.
New packages are available, as indicated in information sources.

SUSE LE 9: new kernel packages (23/08/2011).
New packages are available:
http://download.novell.com/patch/finder/?keywords=c05dae2ea95bb787f18166cf12f585e3

SUSE: new kernel packages (02/12/2009).
New packages are available in information sources.

SUSE SLE 10: new kernel packages.
New packages are available, as indicated in information sources.

SUSE SLE 9, POS 9: new kernel packages.
New packages are available, as indicated in information sources.

VMware ESX, ESXi: patch.
A patch is available:
ESXi 4.0 :
  http://bit.ly/bjWeCV
  http://kb.vmware.com/kb/1021041
ESX 4.0 :
  http://bit.ly/aqTCqn
  http://kb.vmware.com/kb/1013127
ESXi 3.5 :
  http://download3.vmware.com/software/vi/ESXe350-201006401-O-SG.zip
  http://kb.vmware.com/kb/1020052
ESX 3.5 :
  http://download3.vmware.com/software/vi/ESX350-201006408-SG.zip
  http://kb.vmware.com/kb/1020172
  http://download3.vmware.com/software/vi/ESX350-201006405-SG.zip
  http://kb.vmware.com/kb/1020169
  http://download3.vmware.com/software/vi/ESX350-201006406-SG.zip
  http://kb.vmware.com/kb/1020170

VMware ESX: patch.
A patch is available:
ESX 4.0 :
  https://hostupdate.vmware.com/software/VUM/OFFLINE/release-192-20100228-732240/ESX400-201002001.zip
  http://kb.vmware.com/kb/1018403
  http://bit.ly/aqTCqn
  http://kb.vmware.com/kb/1013127
ESX 3.5 :
  http://download3.vmware.com/software/vi/ESX350-201006407-SG.zip
  http://kb.vmware.com/kb/1020171
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a software vulnerability patch. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.