SB2009090201 - NULL pointer dereference in Linux kernel char driver
Published: September 2, 2009 Updated: June 4, 2024
Security Bulletin ID
SB2009090201
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2009-3043)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the tty_ldisc_restore() and tty_ldisc_hangup() functions in drivers/char/tty_ldisc.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5c58ceff103d8a654f24769bb1baaf84a841b0cc
- http://lkml.org/lkml/2009/8/20/21
- http://lkml.org/lkml/2009/8/20/27
- http://lkml.org/lkml/2009/8/20/68
- http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.31-rc8
- http://www.openwall.com/lists/oss-security/2009/08/31/1
- http://www.openwall.com/lists/oss-security/2009/09/03/6
- http://www.openwall.com/lists/oss-security/2009/09/03/7
- http://www.securityfocus.com/bid/36191