~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Candidate: CVE-2009-1046
PublicDate: 2009-03-23
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046
 http://www.ubuntu.com/usn/usn-751-1
Description:
 The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4,
 2.6.25, and possibly earlier versions, when the UTF-8 console is used,
 allows physically proximate attackers to cause a denial of service (memory
 corruption) by selecting a small number of 3-byte UTF-8 characters, which
 triggers an "off-by-two memory error." NOTE: it is not clear whether this
 issue crosses privilege boundaries.
Ubuntu-Description:
 The virtual consoles did not correctly handle certain UTF-8 sequences.
 A local attacker on the physical console could exploit this to cause a
 system crash, leading to a denial of service.
Notes:
Bugs:
Priority: low
Discovered-by:
Assigned-to:

Patches_linux-source-2.6.15:
upstream_linux-source-2.6.15: needs-triage
dapper_linux-source-2.6.15: not-affected
gutsy_linux-source-2.6.15: DNE
hardy_linux-source-2.6.15: DNE
intrepid_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE

Patches_linux-source-2.6.22:
upstream_linux-source-2.6.22: needs-triage
dapper_linux-source-2.6.22: DNE
gutsy_linux-source-2.6.22: released (2.6.22-16.62)
hardy_linux-source-2.6.22: DNE
intrepid_linux-source-2.6.22: DNE
jaunty_linux-source-2.6.22: DNE
devel_linux-source-2.6.22: DNE

Patches_linux:
upstream_linux: needs-triage
dapper_linux: DNE
gutsy_linux: DNE
hardy_linux: released (2.6.24-23.52)
intrepid_linux: released (2.6.27-11.31)
jaunty_linux: not-affected
devel_linux: not-affected