Name | CVE-2009-1046 |
Description | The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-1787-1, DSA-1800-1 |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
linux-2.6 | source | etch | (not affected) | |||
linux-2.6 | source | lenny | 2.6.26-15lenny2 | DSA-1800-1 | ||
linux-2.6 | source | (unstable) | 2.6.29-1 | |||
linux-2.6.24 | source | etch | 2.6.24-6~etchnhalf.8etch1 | DSA-1787-1 | ||
linux-2.6.24 | source | (unstable) | (unfixed) | |||
user-mode-linux | source | lenny | 2.6.26-1um-2+15lenny2 | DSA-1800-1 |
[etch] - linux-2.6 <not-affected> (Introduced in 2.6.23-rc1)