CVE Vulnerabilities

CVE-2009-2692

Use of Uninitialized Resource

Published: Aug 14, 2009 | Modified: Apr 09, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
7.2 IMPORTANT
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.

Weakness

The product uses or accesses a resource that has not been initialized.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux2.4.4 (including)2.4.37.5 (excluding)
Linux_kernelLinux2.6.0 (including)2.6.30.5 (excluding)
MRG for RHEL-5RedHatkernel-rt-0:2.6.24.7-132.el5rt*
Red Hat Enterprise Linux 3RedHatkernel-0:2.4.21-60.EL*
Red Hat Enterprise Linux 4RedHatkernel-0:2.6.9-89.0.9.EL*
Red Hat Enterprise Linux 4.7 Z StreamRedHatkernel-0:2.6.9-78.0.27.EL*
Red Hat Enterprise Linux 5RedHatkernel-0:2.6.18-128.7.1.el5*
Red Hat Enterprise Linux 5.2 Z StreamRedHatkernel-0:2.6.18-92.1.28.el5*
LinuxUbuntuhardy*
LinuxUbuntuintrepid*
LinuxUbuntujaunty*
LinuxUbuntuupstream*
Linux-source-2.6.15Ubuntudapper*
Linux-source-2.6.15Ubuntuupstream*

Potential Mitigations

References