Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
BID:12971
Info
Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
| Bugtraq ID: | 12971 |
| Class: | Access Validation Error |
| CVE: |
CVE-2005-0839 |
| Remote: | No |
| Local: | Yes |
| Published: | Jan 28 2005 12:00AM |
| Updated: | Jul 12 2009 11:56AM |
| Credit: | The vendor disclosed this vulnerability. |
| Vulnerable: |
Redhat Enterprise Linux WS 4 Redhat Enterprise Linux ES 4 Redhat Enterprise Linux AS 4 Redhat Desktop 4.0 Mandriva Linux Mandrake 10.1 x86_64 Mandriva Linux Mandrake 10.1 Mandriva Linux Mandrake 10.0 AMD64 Mandriva Linux Mandrake 10.0 MandrakeSoft Multi Network Firewall 2.0 MandrakeSoft Corporate Server 3.0 x86_64 MandrakeSoft Corporate Server 3.0 MandrakeSoft Corporate Server 2.1 x86_64 MandrakeSoft Corporate Server 2.1 Linux kernel 2.6.11 .6 Linux kernel 2.6.11 .5 Linux kernel 2.6.11 -rc4 Linux kernel 2.6.11 -rc3 Linux kernel 2.6.11 -rc2 Linux kernel 2.6.11 Linux kernel 2.6.10 rc2 Linux kernel 2.6.10 Linux kernel 2.6.9 Linux kernel 2.6.8 rc3 Linux kernel 2.6.8 rc2 Linux kernel 2.6.8 rc1 Linux kernel 2.6.8 Linux kernel 2.6.7 rc1 Linux kernel 2.6.7 Linux kernel 2.6.6 rc1 Linux kernel 2.6.6 Linux kernel 2.6.5 Linux kernel 2.6.4 Linux kernel 2.6.3 Linux kernel 2.6.2 Linux kernel 2.6.1 -rc2 Linux kernel 2.6.1 -rc1 Linux kernel 2.6.1 Linux kernel 2.6 .10 Linux kernel 2.6 -test9-CVS Linux kernel 2.6 -test9 Linux kernel 2.6 -test8 Linux kernel 2.6 -test7 Linux kernel 2.6 -test6 Linux kernel 2.6 -test5 Linux kernel 2.6 -test4 Linux kernel 2.6 -test3 Linux kernel 2.6 -test2 Linux kernel 2.6 -test11 Linux kernel 2.6 -test10 Linux kernel 2.6 -test1 Linux kernel 2.6 Linux kernel 2.4.30 rc3 Linux kernel 2.4.30 rc2 Linux kernel 2.4.29 -rc2 Linux kernel 2.4.29 -rc1 Linux kernel 2.4.29 Linux kernel 2.4.28 Linux kernel 2.4.27 -pre5 Linux kernel 2.4.27 -pre4 Linux kernel 2.4.27 -pre3 Linux kernel 2.4.27 -pre2 Linux kernel 2.4.27 -pre1 Linux kernel 2.4.27 Linux kernel 2.4.26 Linux kernel 2.4.25 Linux kernel 2.4.24 -ow1 Linux kernel 2.4.24 Linux kernel 2.4.23 -pre9 Linux kernel 2.4.23 -ow2 Linux kernel 2.4.23 Linux kernel 2.4.22 Linux kernel 2.4.21 pre7 Linux kernel 2.4.21 pre4 Linux kernel 2.4.21 pre1 Linux kernel 2.4.21 Linux kernel 2.4.20 Linux kernel 2.4.19 -pre6 Linux kernel 2.4.19 -pre5 Linux kernel 2.4.19 -pre4 Linux kernel 2.4.19 -pre3 Linux kernel 2.4.19 -pre2 Linux kernel 2.4.19 -pre1 Linux kernel 2.4.19 Linux kernel 2.4.18 pre-8 Linux kernel 2.4.18 pre-7 Linux kernel 2.4.18 pre-6 Linux kernel 2.4.18 pre-5 Linux kernel 2.4.18 pre-4 Linux kernel 2.4.18 pre-3 Linux kernel 2.4.18 pre-2 Linux kernel 2.4.18 pre-1 Linux kernel 2.4.18 x86 Linux kernel 2.4.18 Linux kernel 2.4.17 Linux kernel 2.4.16 Linux kernel 2.4.15 Linux kernel 2.4.14 Linux kernel 2.4.13 Linux kernel 2.4.12 Linux kernel 2.4.11 Linux kernel 2.4.10 Linux kernel 2.4.9 Linux kernel 2.4.8 Linux kernel 2.4.7 Linux kernel 2.4.6 Linux kernel 2.4.5 Linux kernel 2.4.4 Linux kernel 2.4.3 Linux kernel 2.4.2 Linux kernel 2.4.1 Linux kernel 2.4 .0-test9 Linux kernel 2.4 .0-test8 Linux kernel 2.4 .0-test7 Linux kernel 2.4 .0-test6 Linux kernel 2.4 .0-test5 Linux kernel 2.4 .0-test4 Linux kernel 2.4 .0-test3 Linux kernel 2.4 .0-test2 Linux kernel 2.4 .0-test12 Linux kernel 2.4 .0-test11 Linux kernel 2.4 .0-test10 Linux kernel 2.4 .0-test1 Linux kernel 2.4 |
| Not Vulnerable: | |
Discussion
Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
The Linux kernel is reported prone to an access validation vulnerability. It is reported that the Linux kernel serial driver does not sufficiently control access to the use of the N_MOUSE line discipline.
A local interactive attacker may leverage this issue to inject mouse and keyboard events into an alternate X session or console that is running in the context of another user.
The Linux kernel is reported prone to an access validation vulnerability. It is reported that the Linux kernel serial driver does not sufficiently control access to the use of the N_MOUSE line discipline.
A local interactive attacker may leverage this issue to inject mouse and keyboard events into an alternate X session or console that is running in the context of another user.
Exploit / POC
Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected] <mailto:[email protected]>.
Solution / Fix
Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
Solution:
The vendor has released a patch to address this issue; it is available at the following location:
http://www.securityfocus.com/data/vulnerabilities/patches/serport.patch
Ubuntu has released an advisory (USN-103-1) and fixes to address this issue and other Linux Kernel vulnerabilities. Customers are advised to peruse the referenced advisory to obtain further information in regards to obtaining and applying an appropriate update.
RedHat has released advisory RHSA-2005:366-19 to address this, and other issues in RedHat Enterprise Linux 4, and RedHat Desktop 4 operating systems. Please see the referenced advisory for further information.
Mandriva Linux has released advisory MDKSA-2005:110 addressing this issue. Please see the referenced advisory for further information.
Linux kernel 2.6.8 rc1
Solution:
The vendor has released a patch to address this issue; it is available at the following location:
http://www.securityfocus.com/data/vulnerabilities/patches/serport.patch
Ubuntu has released an advisory (USN-103-1) and fixes to address this issue and other Linux Kernel vulnerabilities. Customers are advised to peruse the referenced advisory to obtain further information in regards to obtaining and applying an appropriate update.
RedHat has released advisory RHSA-2005:366-19 to address this, and other issues in RedHat Enterprise Linux 4, and RedHat Desktop 4 operating systems. Please see the referenced advisory for further information.
Mandriva Linux has released advisory MDKSA-2005:110 addressing this issue. Please see the referenced advisory for further information.
Linux kernel 2.6.8 rc1
-
Ubuntu linux-doc-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-doc-2.6.8.1_2.6.8.1-16.13_all.deb -
Ubuntu linux-headers-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.13_i386.deb -
Ubuntu linux-headers-2.6.8.1-5_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-headers-2.6.8.1-5_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-386_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-686-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-686_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-generic_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-k8-smp_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-k8_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-amd64-xeon_2.6.8.1-16.13_amd64.deb -
Ubuntu linux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-k7-smp_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-k7_2.6.8.1-16.13_i386.deb -
Ubuntu linux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power3-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power3_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power4-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-power4_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-powerpc-smp_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-image-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-image-2.6.8.1-5-powerpc_2.6.8.1-16.13_powerpc.deb -
Ubuntu linux-patch-debian-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-patch-debian-2.6.8.1_2.6.8.1-16.13_all.deb -
Ubuntu linux-source-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-source-2.6.8.1_2.6.8.1-16.13_all.deb -
Ubuntu linux-tree-2.6.8.1_2.6.8.1-16.13_all.deb
Ubuntu 4.10 (Warty Warthog)
http://security.ubuntu.com/ubuntu/pool/main/l/linux-source-2.6.8.1/lin ux-tree-2.6.8.1_2.6.8.1-16.13_all.deb
References
Linux Kernel Serial Driver Local Mouse And Keyboard Event Injection Vulnerability
References:
References:
- Changes for drivers/input/serio/[email protected] (Linux Kernel)
- Re: Breakage from patch: Only root should be able to set the N_MOUSE line discip (Vojtech Pavlik)
- RHSA-2005:366-19 - kernel security update (RedHat)