CVE-2010-0307

Publication date 17 February 2010

Last updated 24 July 2024


Ubuntu priority

The load_elf_binary function in fs/binfmt_elf.c in the Linux kernel before 2.6.32.8 on the x86_64 platform does not ensure that the ELF interpreter is available before a call to the SET_PERSONALITY macro, which allows local users to cause a denial of service (system crash) via a 32-bit application that attempts to execute a 64-bit application and then triggers a segmentation fault, as demonstrated by amd64_killer, related to the flush_old_exec function.

From the Ubuntu Security Team

Mathias Krause discovered that the Linux kernel did not correctly handle missing ELF interpreters. A local attacker could exploit this to cause the system to crash, leading to a denial of service.

Read the notes from the security team

Status

Package Ubuntu Release Status
linux 9.10 karmic
Fixed 2.6.31-20.58
9.04 jaunty
Fixed 2.6.28-18.60
8.10 intrepid
Fixed 2.6.27-17.46
8.04 LTS hardy
Fixed 2.6.24-27.68
6.06 LTS dapper Not in release
linux-source-2.6.15 9.10 karmic Not in release
9.04 jaunty Not in release
8.10 intrepid Not in release
8.04 LTS hardy Not in release
6.06 LTS dapper
Fixed 2.6.15-55.83

Notes


jdstrand

commits based on comments from dann frazier <[email protected]> in oss-security

References

Related Ubuntu Security Notices (USN)

    • USN-914-1
    • Linux kernel vulnerabilities
    • 17 March 2010

Other references