2
Candidate: CVE-2008-2812
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812
5
https://usn.ubuntu.com/usn/usn-637-1
7
The Linux kernel before 2.6.25.10 does not properly perform tty operations,
8
which allows local users to cause a denial of service (system crash) or
9
possibly gain privileges via vectors involving NULL pointer dereference of
10
function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3)
11
irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7)
12
wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
14
It was discovered that there were multiple NULL-pointer function
15
dereferences in the Linux kernel terminal handling code. A local
16
attacker could exploit this to execute arbitrary code as root, or crash
17
the system, leading to a denial of service.
24
Patches_linux-source-2.6.15:
25
upstream_linux-source-2.6.15: needs-triage
26
dapper_linux-source-2.6.15: released (2.6.15-52.71)
27
feisty_linux-source-2.6.15: DNE
28
gutsy_linux-source-2.6.15: DNE
29
hardy_linux-source-2.6.15: DNE
30
intrepid_linux-source-2.6.15: DNE
31
devel_linux-source-2.6.15: DNE
33
Patches_linux-source-2.6.20:
34
upstream_linux-source-2.6.20: needs-triage
35
dapper_linux-source-2.6.20: DNE
36
feisty_linux-source-2.6.20: released (2.6.20-17.39)
37
gutsy_linux-source-2.6.20: DNE
38
hardy_linux-source-2.6.20: DNE
39
intrepid_linux-source-2.6.20: DNE
40
devel_linux-source-2.6.20: DNE
42
Patches_linux-source-2.6.22:
43
upstream_linux-source-2.6.22: needs-triage
44
dapper_linux-source-2.6.22: DNE
45
feisty_linux-source-2.6.22: DNE
46
gutsy_linux-source-2.6.22: released (2.6.22-15.58)
47
hardy_linux-source-2.6.22: DNE
48
intrepid_linux-source-2.6.22: DNE
49
devel_linux-source-2.6.22: DNE
52
upstream_linux: needs-triage
56
hardy_linux: released (2.6.24-19.41)
57
intrepid_linux: not-affected
58
devel_linux: not-affected