Red Hat Customer Portal

Skip to main content

Security Advisory Important: udev security update

Advisory: RHSA-2009:0427-1
Type: Security Advisory
Severity: Important
Issued on: 2009-04-16
Last updated on: 2009-04-16
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)
CVEs (cve.mitre.org): CVE-2009-1185

Details

Updated udev packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.

This update has been rated as having important security impact by the Red
Hat Security Response Team.

udev provides a user-space API and implements a dynamic device directory,
providing only the devices present on the system. udev replaces devfs in
order to provide greater hot plug functionality. Netlink is a datagram
oriented service, used to transfer information between kernel modules and
user-space processes.

It was discovered that udev did not properly check the origin of Netlink
messages. A local attacker could use this flaw to gain root privileges via
a crafted Netlink message sent to udev, causing it to create a
world-writable block device file for an existing system block device (for
example, the root file system). (CVE-2009-1185)

Red Hat would like to thank Sebastian Krahmer of the SUSE Security Team for
responsibly reporting this flaw.

Users of udev are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
update, the udevd daemon will be restarted automatically.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
udev-095-14.20.el5_3.src.rpm
File outdated by:  RHBA-2015:1652
    MD5: 770e7867ecd610e298616451d304f635
 
IA-32:
libvolume_id-devel-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: dc7dcd3b6cef89907d46668be6d0fed5
 
x86_64:
libvolume_id-devel-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: dc7dcd3b6cef89907d46668be6d0fed5
libvolume_id-devel-095-14.20.el5_3.x86_64.rpm
File outdated by:  RHBA-2015:1652
    MD5: 85722e02acb9573a6e2a026eac448fd6
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
udev-095-14.20.el5_3.src.rpm
File outdated by:  RHBA-2015:1652
    MD5: 770e7867ecd610e298616451d304f635
 
IA-32:
libvolume_id-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-devel-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: dc7dcd3b6cef89907d46668be6d0fed5
udev-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: 76099fe4596bde8e75e7e45fb65496f1
 
IA-64:
libvolume_id-095-14.20.el5_3.ia64.rpm
File outdated by:  RHBA-2015:1652
    MD5: 194f7888613855256d2923f6eb680612
libvolume_id-devel-095-14.20.el5_3.ia64.rpm
File outdated by:  RHBA-2015:1652
    MD5: fbc9f40656104f8d934ad2a19e9dd024
udev-095-14.20.el5_3.ia64.rpm
File outdated by:  RHBA-2015:1652
    MD5: 9c8d27f0f329ae35ff067e3caa4852d3
 
PPC:
libvolume_id-095-14.20.el5_3.ppc.rpm
File outdated by:  RHBA-2015:1652
    MD5: a40b76030e45d1098388fb471ff85091
libvolume_id-095-14.20.el5_3.ppc64.rpm
File outdated by:  RHBA-2015:1652
    MD5: 5be820c4294f452aea686e5584459440
libvolume_id-devel-095-14.20.el5_3.ppc.rpm
File outdated by:  RHBA-2015:1652
    MD5: c3840c458c21355ca52bf6a1c66c5db8
libvolume_id-devel-095-14.20.el5_3.ppc64.rpm
File outdated by:  RHBA-2015:1652
    MD5: 43ff81ab931de7f099044b5904b38e6a
udev-095-14.20.el5_3.ppc.rpm
File outdated by:  RHBA-2015:1652
    MD5: ece83c51bb5c28ed31863b978d9bb9c5
 
s390x:
libvolume_id-095-14.20.el5_3.s390.rpm
File outdated by:  RHBA-2015:1652
    MD5: a3d19d38a7b995bae1d66477b775b8c6
libvolume_id-095-14.20.el5_3.s390x.rpm
File outdated by:  RHBA-2015:1652
    MD5: 78bd7783c0e4d67636a1b4b1cc1586ca
libvolume_id-devel-095-14.20.el5_3.s390.rpm
File outdated by:  RHBA-2015:1652
    MD5: 8f9204fbe2bce2ee5efe4d745bd28eb6
libvolume_id-devel-095-14.20.el5_3.s390x.rpm
File outdated by:  RHBA-2015:1652
    MD5: 74cc11d4c9f6e80e305fc15511d532b2
udev-095-14.20.el5_3.s390x.rpm
File outdated by:  RHBA-2015:1652
    MD5: ef538957b4885fbe2f8cd46186971e17
 
x86_64:
libvolume_id-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-095-14.20.el5_3.x86_64.rpm
File outdated by:  RHBA-2015:1652
    MD5: c50d90ac17f9da3fe144a6ad33b897e3
libvolume_id-devel-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: dc7dcd3b6cef89907d46668be6d0fed5
libvolume_id-devel-095-14.20.el5_3.x86_64.rpm
File outdated by:  RHBA-2015:1652
    MD5: 85722e02acb9573a6e2a026eac448fd6
udev-095-14.20.el5_3.x86_64.rpm
File outdated by:  RHBA-2015:1652
    MD5: b87fea58301e3266345543fae782bf0f
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
udev-095-14.20.el5_3.src.rpm
File outdated by:  RHBA-2015:1652
    MD5: 770e7867ecd610e298616451d304f635
 
IA-32:
libvolume_id-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: f23aa1041863d3eca96af900b0e2ba00
udev-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: 76099fe4596bde8e75e7e45fb65496f1
 
x86_64:
libvolume_id-095-14.20.el5_3.i386.rpm
File outdated by:  RHBA-2015:1652
    MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-095-14.20.el5_3.x86_64.rpm
File outdated by:  RHBA-2015:1652
    MD5: c50d90ac17f9da3fe144a6ad33b897e3
udev-095-14.20.el5_3.x86_64.rpm
File outdated by:  RHBA-2015:1652
    MD5: b87fea58301e3266345543fae782bf0f
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
udev-095-14.20.el5_3.src.rpm
File outdated by:  RHBA-2015:1652
    MD5: 770e7867ecd610e298616451d304f635
 
IA-32:
libvolume_id-095-14.20.el5_3.i386.rpm     MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-devel-095-14.20.el5_3.i386.rpm     MD5: dc7dcd3b6cef89907d46668be6d0fed5
udev-095-14.20.el5_3.i386.rpm     MD5: 76099fe4596bde8e75e7e45fb65496f1
 
IA-64:
libvolume_id-095-14.20.el5_3.ia64.rpm     MD5: 194f7888613855256d2923f6eb680612
libvolume_id-devel-095-14.20.el5_3.ia64.rpm     MD5: fbc9f40656104f8d934ad2a19e9dd024
udev-095-14.20.el5_3.ia64.rpm     MD5: 9c8d27f0f329ae35ff067e3caa4852d3
 
PPC:
libvolume_id-095-14.20.el5_3.ppc.rpm     MD5: a40b76030e45d1098388fb471ff85091
libvolume_id-095-14.20.el5_3.ppc64.rpm     MD5: 5be820c4294f452aea686e5584459440
libvolume_id-devel-095-14.20.el5_3.ppc.rpm     MD5: c3840c458c21355ca52bf6a1c66c5db8
libvolume_id-devel-095-14.20.el5_3.ppc64.rpm     MD5: 43ff81ab931de7f099044b5904b38e6a
udev-095-14.20.el5_3.ppc.rpm     MD5: ece83c51bb5c28ed31863b978d9bb9c5
 
s390x:
libvolume_id-095-14.20.el5_3.s390.rpm     MD5: a3d19d38a7b995bae1d66477b775b8c6
libvolume_id-095-14.20.el5_3.s390x.rpm     MD5: 78bd7783c0e4d67636a1b4b1cc1586ca
libvolume_id-devel-095-14.20.el5_3.s390.rpm     MD5: 8f9204fbe2bce2ee5efe4d745bd28eb6
libvolume_id-devel-095-14.20.el5_3.s390x.rpm     MD5: 74cc11d4c9f6e80e305fc15511d532b2
udev-095-14.20.el5_3.s390x.rpm     MD5: ef538957b4885fbe2f8cd46186971e17
 
x86_64:
libvolume_id-095-14.20.el5_3.i386.rpm     MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-095-14.20.el5_3.x86_64.rpm     MD5: c50d90ac17f9da3fe144a6ad33b897e3
libvolume_id-devel-095-14.20.el5_3.i386.rpm     MD5: dc7dcd3b6cef89907d46668be6d0fed5
libvolume_id-devel-095-14.20.el5_3.x86_64.rpm     MD5: 85722e02acb9573a6e2a026eac448fd6
udev-095-14.20.el5_3.x86_64.rpm     MD5: b87fea58301e3266345543fae782bf0f
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
udev-095-14.20.el5_3.src.rpm
File outdated by:  RHBA-2015:1652
    MD5: 770e7867ecd610e298616451d304f635
 
IA-32:
libvolume_id-095-14.20.el5_3.i386.rpm     MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-devel-095-14.20.el5_3.i386.rpm     MD5: dc7dcd3b6cef89907d46668be6d0fed5
udev-095-14.20.el5_3.i386.rpm     MD5: 76099fe4596bde8e75e7e45fb65496f1
 
IA-64:
libvolume_id-095-14.20.el5_3.ia64.rpm     MD5: 194f7888613855256d2923f6eb680612
libvolume_id-devel-095-14.20.el5_3.ia64.rpm     MD5: fbc9f40656104f8d934ad2a19e9dd024
udev-095-14.20.el5_3.ia64.rpm     MD5: 9c8d27f0f329ae35ff067e3caa4852d3
 
x86_64:
libvolume_id-095-14.20.el5_3.i386.rpm     MD5: f23aa1041863d3eca96af900b0e2ba00
libvolume_id-095-14.20.el5_3.x86_64.rpm     MD5: c50d90ac17f9da3fe144a6ad33b897e3
libvolume_id-devel-095-14.20.el5_3.i386.rpm     MD5: dc7dcd3b6cef89907d46668be6d0fed5
libvolume_id-devel-095-14.20.el5_3.x86_64.rpm     MD5: 85722e02acb9573a6e2a026eac448fd6
udev-095-14.20.el5_3.x86_64.rpm     MD5: b87fea58301e3266345543fae782bf0f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

495051 - CVE-2009-1185 udev: Uncheck origin of NETLINK messages


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/