~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Candidate: CVE-2009-1265
PublicDate: 2009-04-07
References:
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265
 http://www.ubuntu.com/usn/usn-793-1
Description:
 Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel
 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote
 attackers to obtain sensitive information via a large length value, which
 causes "garbage" memory to be sent.
Ubuntu-Description:
Notes:
Bugs:
 http://bugzilla.kernel.org/show_bug.cgi?id=10423
Priority: low
Discovered-by:
Assigned-to:

Patches_linux-source-2.6.15:
upstream_linux-source-2.6.15: released (2.6.30~rc1)
dapper_linux-source-2.6.15: released (2.6.15-54.77)
gutsy_linux-source-2.6.15: DNE
hardy_linux-source-2.6.15: DNE
intrepid_linux-source-2.6.15: DNE
jaunty_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE

Patches_linux-source-2.6.22:
upstream_linux-source-2.6.22: released (2.6.30~rc1)
dapper_linux-source-2.6.22: DNE
gutsy_linux-source-2.6.22: needs-triage (reached end-of-life)
hardy_linux-source-2.6.22: DNE
intrepid_linux-source-2.6.22: DNE
jaunty_linux-source-2.6.22: DNE
devel_linux-source-2.6.22: DNE

Patches_linux:
 upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=83e0bbcbe2145f160fbaa109b0439dae7f4a38a9
upstream_linux: released (2.6.30~rc1)
dapper_linux: DNE
gutsy_linux: DNE
hardy_linux: released (2.6.24-24.55)
intrepid_linux: released (2.6.27-14.35)
jaunty_linux: released (2.6.28-13.45)
devel_linux: not-affected