blob: 927c696edfdb0da70fb64f692e0f6d23a76a6da0 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
Candidate: CVE-2009-1243
Description:
net/ipv4/udp.c in the Linux kernel before 2.6.29.1 performs an unlocking
step in certain incorrect circumstances, which allows local users to cause
a denial of service (panic) by reading zero bytes from the /proc/net/udp
file and unspecified other files, related to the "udp seq_file infrastructure."
References:
http://openwall.com/lists/oss-security/2009/04/01/4
http://vigilance.fr/vulnerability/Linux-kernel-denial-of-service-via-proc-net-udp-8586
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=30842f2989aacfaba3ccb39829b3417be9313dbe
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.1
Ubuntu-Description:
Notes:645ca708
jmm> Introduced in 645ca708, so only affects >= 2.6.28
Bugs:
upstream: released (2.6.29.1)
linux-2.6: released (2.6.29-2)
2.6.18-etch-security: N/A
2.6.24-etch-security: N/A
2.6.26-lenny-security: N/A
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
2.6.27-intrepid-security:
|