CVE-2009-1265

Publication date 8 April 2009

Last updated 24 July 2024


Ubuntu priority

Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.

Status

Package Ubuntu Release Status
linux 9.04 jaunty
Fixed 2.6.28-13.45
8.10 intrepid
Fixed 2.6.27-14.35
8.04 LTS hardy
Fixed 2.6.24-24.55
7.10 gutsy Not in release
6.06 LTS dapper Not in release
linux-source-2.6.15 9.04 jaunty Not in release
8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy Not in release
6.06 LTS dapper
Fixed 2.6.15-54.77
linux-source-2.6.22 9.04 jaunty Not in release
8.10 intrepid Not in release
8.04 LTS hardy Not in release
7.10 gutsy Ignored end of life, was needs-triage
6.06 LTS dapper Not in release

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
linux

References

Related Ubuntu Security Notices (USN)

    • USN-793-1
    • Linux kernel vulnerabilities
    • 2 July 2009

Other references