Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
7.8HIGH
EPSS
17.6%
top 4.91%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 14
Latest updateMay 2

Description

The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages5 packages

Also affects: Debian Linux 4.0, Enterprise Linux 4.8, 5.3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j86m-g62r-5g7r: The Linux kernel 22022-05-02
CVEList
CVE-2009-2692: The Linux kernel 22009-08-14
VulnCheck
Linux Kernel Use of Uninitialized Resource2009

💥Exploits & PoCs

8
Exploit-DB
Linux Kernel 2.4.4 < 2.4.37.4 / 2.6.0 < 2.6.30.4 - 'Sendpage' Local Privilege Escalation (Metasploit)2012-07-19
Exploit-DB
Linux Kernel 2.4/2.6 - 'sock_sendpage()' Local Privilege Escalation (3)2009-09-11
Exploit-DB
Linux Kernel 2.4/2.6 (Fedora 11) - 'sock_sendpage()' Local Privilege Escalation (2)2009-09-09
Exploit-DB
Linux Kernel 2.4.x/2.6.x (CentOS 4.8/5.3 / RHEL 4.8/5.3 / SuSE 10 SP2/11 / Ubuntu 8.10) (PPC) - 'sock_sendpage()' Local Privilege Escalation2009-08-31
Exploit-DB
Linux Kernel 2.4/2.6 (RedHat Linux 9 / Fedora Core 4 < 11 / Whitebox 4 / CentOS 4) - 'sock_sendpage()' Ring0 Privilege Escalation (5)2009-08-24

📋Vendor Advisories

2
Ubuntu
Linux kernel vulnerability2009-08-19
Red Hat
kernel: uninit op in SOCKOPS_WRAP() leads to privesc2009-08-13