-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                     ESB-2009.0365 -- [Linux][Ubuntu]
                           udev: Root Compromise
                               22 April 2009

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              udev
Publisher:            Ubuntu
Operating System:     Ubuntu
                      Linux variants
Impact:               Root Compromise
                      Denial of Service
Access:               Existing Account
CVE Names:            CVE-2009-1186 CVE-2009-1185

Original Bulletin:    http://www.ubuntu.com/usn/usn-758-1

Comment: Public exploit code now available
         
         This advisory references vulnerabilities in products which run on
         platforms other than Ubuntu. It is recommended that
         administrators running udev check for an updated version of the
         software for their operating system.
         
         udev is reportedly included in almost every 2.6 kernel based
         Linux distribution.
         
         http://www.kernel.org/pub/linux/utils/kernel/hotplug/udev.html

Revision History:     April 22 2009: Updated Comment
                      April 16 2009: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

===========================================================
Ubuntu Security Notice USN-758-1             April 15, 2009
udev vulnerabilities
CVE-2009-1185, CVE-2009-1186
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.10
Ubuntu 8.04 LTS
Ubuntu 8.10

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  udev                            079-0ubuntu35.1

Ubuntu 7.10:
  udev                            113-0ubuntu17.2

Ubuntu 8.04 LTS:
  udev                            117-8ubuntu0.2

Ubuntu 8.10:
  udev                            124-9ubuntu0.2

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

Details follow:

Sebastian Krahmer discovered that udev did not correctly validate netlink
message senders.  A local attacker could send specially crafted messages
to udev in order to gain root privileges. (CVE-2009-1185)

Sebastian Krahmer discovered a buffer overflow in the path encoding routines
in udev.  A local attacker could exploit this to crash udev, leading to a
denial of service. (CVE-2009-1186)


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079-0ubuntu35.1.diff.gz
      Size/MD5:    51122 c7d3b676db9a83db24f422a285438ca7
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079-0ubuntu35.1.dsc
      Size/MD5:      670 7cbaeaa0f9888994397d3d7cf90e3658
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079.orig.tar.gz
      Size/MD5:   281803 2b34fbddeadee3728ffe28121d6c1ebd

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_079-0ubuntu35.1_amd64.udeb
      Size/MD5:   142138 1392a4f575c8acda5672fc62f637b3fb
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079-0ubuntu35.1_amd64.deb
      Size/MD5:   279030 84f654a125f3e3d0725103cfe68420b0

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_079-0ubuntu35.1_i386.udeb
      Size/MD5:   109638 4882b6311f73bef9868881b1c5e8ed41
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079-0ubuntu35.1_i386.deb
      Size/MD5:   239122 af377acadfffddf3d9040dc23286fc8f

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_079-0ubuntu35.1_powerpc.udeb
      Size/MD5:   118100 d792bd2e62989a8d95309aed153e4289
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079-0ubuntu35.1_powerpc.deb
      Size/MD5:   280766 b306f68f10ff06ca5cd9ee17828d39d5

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_079-0ubuntu35.1_sparc.udeb
      Size/MD5:   115618 63bcef9fd2bada2eafe266d7796a84c9
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_079-0ubuntu35.1_sparc.deb
      Size/MD5:   247624 4b80d6ca0c5e076f249087c118962922

Updated packages for Ubuntu 7.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113-0ubuntu17.2.diff.gz
      Size/MD5:    55913 a7a1ba8a02b2fe905bc71743e5a5c7c0
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113-0ubuntu17.2.dsc
      Size/MD5:      728 7b6e062975bbe336c2d760e5ff11572a
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113.orig.tar.gz
      Size/MD5:   239920 be4948d5057ae469de9bea8ae588221e

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_113-0ubuntu17.2_amd64.deb
      Size/MD5:    86226 3f5adacc769ddfe17fafd79c54ce81a7
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_113-0ubuntu17.2_amd64.deb
      Size/MD5:    81900 edaba987b6002b09d6b4173e156e330e
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_113-0ubuntu17.2_amd64.udeb
      Size/MD5:   149804 e601d0c2bc7037a8df133a30d1f76605
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113-0ubuntu17.2_amd64.deb
      Size/MD5:   304258 7a2173b367fc88bf531bfb706e3e1f8b
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/volumeid_113-0ubuntu17.2_amd64.deb
      Size/MD5:    75160 fd8f032baabb6f0bbfc6f371cec52e1c

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_113-0ubuntu17.2_i386.deb
      Size/MD5:    83892 12a63120228e99b4730f010cd361c244
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_113-0ubuntu17.2_i386.deb
      Size/MD5:    80572 6b5994b0eadaaee1f523de159718b408
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_113-0ubuntu17.2_i386.udeb
      Size/MD5:   132812 630042b66ab4a4344191fc82ecec0a38
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113-0ubuntu17.2_i386.deb
      Size/MD5:   288284 986d47c76158ade2a30e6a1948f55082
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/volumeid_113-0ubuntu17.2_i386.deb
      Size/MD5:    74174 902478d959375b71e2b78cf0f0f8d82a

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_113-0ubuntu17.2_lpia.deb
      Size/MD5:    83926 a32df0b3fe432aadfad07d3961e20a7e
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_113-0ubuntu17.2_lpia.deb
      Size/MD5:    80568 0266ced7497651f1bc9996ee0e00d6c5
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_113-0ubuntu17.2_lpia.udeb
      Size/MD5:   132732 386aa29c7b1175fac96d231a0e255118
    http://ports.ubuntu.com/pool/main/u/udev/udev_113-0ubuntu17.2_lpia.deb
      Size/MD5:   288604 e05dbb1b8ff89c24b26cf318550442d6
    http://ports.ubuntu.com/pool/main/u/udev/volumeid_113-0ubuntu17.2_lpia.deb
      Size/MD5:    74138 bf4aa952e2d07c0d27fba4e858dcd678

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_113-0ubuntu17.2_powerpc.deb
      Size/MD5:    87538 e0b0ae6ebf9847c5a4141950026b29f2
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_113-0ubuntu17.2_powerpc.deb
      Size/MD5:    83398 a4372fb8399d28496fe8ed7a03fe2aab
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_113-0ubuntu17.2_powerpc.udeb
      Size/MD5:   149236 99bdb65c79ce39bf881fa56972a7df76
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113-0ubuntu17.2_powerpc.deb
      Size/MD5:   336274 d575f25a976f8cbd4cd123f47c696305
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/volumeid_113-0ubuntu17.2_powerpc.deb
      Size/MD5:    77432 6c548fabc0ad7861f125de70071cd0d7

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_113-0ubuntu17.2_sparc.deb
      Size/MD5:    87846 a331c703a9b11a20670a160d9bc5a16e
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_113-0ubuntu17.2_sparc.deb
      Size/MD5:    83846 6d2a1c58ea38e9b71fba17f841b4a26c
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_113-0ubuntu17.2_sparc.udeb
      Size/MD5:   141244 de4f7c09715c900cda38abbf53a6bf0f
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_113-0ubuntu17.2_sparc.deb
      Size/MD5:   294436 4591981586a1d547ea33c3cc8b09b39b
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/volumeid_113-0ubuntu17.2_sparc.deb
      Size/MD5:    74714 cee96bfcea22c72a410644cb812591c0

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_117-8ubuntu0.2.diff.gz
      Size/MD5:    65730 81fffa88d20b553d3957cc5180258028
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_117-8ubuntu0.2.dsc
      Size/MD5:      716 5ce142feffe74504599351ce14f8e79c
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_117.orig.tar.gz
      Size/MD5:   245289 1e2b0a30a39019fc7ef947786102cd22

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_117-8ubuntu0.2_amd64.deb
      Size/MD5:    90008 9b726512e3681753aa17b4c28f5f0c97
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_117-8ubuntu0.2_amd64.deb
      Size/MD5:    85680 7b719dd5b310814d742d82e8187936ad
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_117-8ubuntu0.2_amd64.udeb
      Size/MD5:   142424 3b3556f38c4751c19e94dfa442378975
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_117-8ubuntu0.2_amd64.deb
      Size/MD5:   275764 a7341d40aaf3886ede818bacdb8f725b

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_117-8ubuntu0.2_i386.deb
      Size/MD5:    87874 bba06e76c225f835d4bd5da9cf71cb17
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_117-8ubuntu0.2_i386.deb
      Size/MD5:    84476 2aaa0302816eb8d524b4b9eed6cc6664
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_117-8ubuntu0.2_i386.udeb
      Size/MD5:   125376 12efe871f550741a6070849ecbf345d8
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_117-8ubuntu0.2_i386.deb
      Size/MD5:   262096 14de9f79f3e92bca2fd087747fe2cbe4

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_117-8ubuntu0.2_lpia.deb
      Size/MD5:    87820 06ae468615109e9693007bbbbd5ab76c
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_117-8ubuntu0.2_lpia.deb
      Size/MD5:    84344 74698366a89ff79f7da56e1e8081b7f8
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_117-8ubuntu0.2_lpia.udeb
      Size/MD5:   125366 24e6abe9d2d71edc59c8fee7c321aac4
    http://ports.ubuntu.com/pool/main/u/udev/udev_117-8ubuntu0.2_lpia.deb
      Size/MD5:   262202 ccd906dc5ba0f8150d2e54560cb506fa

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_117-8ubuntu0.2_powerpc.deb
      Size/MD5:    91184 0244aee4cd0b49b752b60bb69b822e8d
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_117-8ubuntu0.2_powerpc.deb
      Size/MD5:    87282 717d460e52f5208028b8a114c41441d3
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_117-8ubuntu0.2_powerpc.udeb
      Size/MD5:   142902 ac0227c34eabb4f40f8011ab810c6774
    http://ports.ubuntu.com/pool/main/u/udev/udev_117-8ubuntu0.2_powerpc.deb
      Size/MD5:   284190 791467a0daac1a186b308a5260998765

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_117-8ubuntu0.2_sparc.deb
      Size/MD5:    91172 5d7f21eb5e8183fd4a3a93a08e71fa9a
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_117-8ubuntu0.2_sparc.deb
      Size/MD5:    87420 5799e495a349dffb947bca5b831e0a59
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_117-8ubuntu0.2_sparc.udeb
      Size/MD5:   134148 07f30c5e47363b26a07a695ef208ac39
    http://ports.ubuntu.com/pool/main/u/udev/udev_117-8ubuntu0.2_sparc.deb
      Size/MD5:   268260 81d8d2489b05238c43928ccca028fd97

Updated packages for Ubuntu 8.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_124-9ubuntu0.2.diff.gz
      Size/MD5:    60670 3294d977bf37ae45a66d47b624b60db0
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_124-9ubuntu0.2.dsc
      Size/MD5:     1092 b52e321c7c4c0e0d6d292167cb6019f8
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_124.orig.tar.gz
      Size/MD5:   257418 2ea9229208154229c5d6df6222f74ad7

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_124-9ubuntu0.2_amd64.deb
      Size/MD5:    93152 2ae90a4dc2bad933180b03169f021786
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_124-9ubuntu0.2_amd64.deb
      Size/MD5:    88906 31e1fc7a2a7546cdb6c26b38df29cab3
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_124-9ubuntu0.2_amd64.udeb
      Size/MD5:   140768 bff970a06a6364bec08459be64169da8
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_124-9ubuntu0.2_amd64.deb
      Size/MD5:   280684 09f8b16a2b7b7b5c637e314302ad27b1

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id-dev_124-9ubuntu0.2_i386.deb
      Size/MD5:    90866 348a4b3c7ecace17161c156f648ef7f5
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/libvolume-id0_124-9ubuntu0.2_i386.deb
      Size/MD5:    87674 af9f5a9f38ebff8867ea1d6055e33705
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev-udeb_124-9ubuntu0.2_i386.udeb
      Size/MD5:   124664 65a463c6512f87e71b40640809f68245
    http://security.ubuntu.com/ubuntu/pool/main/u/udev/udev_124-9ubuntu0.2_i386.deb
      Size/MD5:   263786 34aa4d7ad23bcd6fe682d5c958c2b176

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_124-9ubuntu0.2_lpia.deb
      Size/MD5:    90952 13a89ac0608a4432f8fe3410798bfc80
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_124-9ubuntu0.2_lpia.deb
      Size/MD5:    87526 c62d3f557da0f00a683dd2affab3ac18
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_124-9ubuntu0.2_lpia.udeb
      Size/MD5:   124596 227b5495edd9e8164030ec9e3445206f
    http://ports.ubuntu.com/pool/main/u/udev/udev_124-9ubuntu0.2_lpia.deb
      Size/MD5:   263960 55a49a09202c83919fc7966e9cb4f0e9

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_124-9ubuntu0.2_powerpc.deb
      Size/MD5:    94720 9f705767aec000389c4a0ac5547e4b08
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_124-9ubuntu0.2_powerpc.deb
      Size/MD5:    90490 0a821585e04ab4a3ae43fba609d15bad
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_124-9ubuntu0.2_powerpc.udeb
      Size/MD5:   136420 a13c982f31bb35caf8bdfa0230d6bf25
    http://ports.ubuntu.com/pool/main/u/udev/udev_124-9ubuntu0.2_powerpc.deb
      Size/MD5:   283654 27a1278de0e01ecd84806b4c52242130

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id-dev_124-9ubuntu0.2_sparc.deb
      Size/MD5:    94552 4ca615812516cb06abbeb05936f60e3c
    http://ports.ubuntu.com/pool/main/u/udev/libvolume-id0_124-9ubuntu0.2_sparc.deb
      Size/MD5:    90856 7c2cbb37e564258dcf75f2f0a85ebe51
    http://ports.ubuntu.com/pool/main/u/udev/udev-udeb_124-9ubuntu0.2_sparc.udeb
      Size/MD5:   136020 0f478380b3c641b037818ed607eea594
    http://ports.ubuntu.com/pool/main/u/udev/udev_124-9ubuntu0.2_sparc.deb
      Size/MD5:   274892 2f392b3a4d9d271db107930adc81e8e4

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFJ7pKMNVH5XJJInbgRAttFAJ4nk4MnKzDSJGIQwnZCkRKyyo6YGwCfekha
d7eGphC9gxk8Y284KrY081w=
=njZ6
-----END PGP SIGNATURE-----