Rapid7 Vulnerability & Exploit Database

USN-637-1: Linux kernel vulnerabilities

Back to Search

USN-637-1: Linux kernel vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
07/08/2008
Created
07/25/2018
Added
05/06/2013
Modified
07/09/2020

Description

The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.

Solution(s)

  • ubuntu-upgrade-linux-image-2-6-20-17-386
  • ubuntu-upgrade-linux-image-2-6-20-17-generic
  • ubuntu-upgrade-linux-image-2-6-20-17-hppa32
  • ubuntu-upgrade-linux-image-2-6-20-17-hppa64
  • ubuntu-upgrade-linux-image-2-6-20-17-itanium
  • ubuntu-upgrade-linux-image-2-6-20-17-lowlatency
  • ubuntu-upgrade-linux-image-2-6-20-17-mckinley
  • ubuntu-upgrade-linux-image-2-6-20-17-powerpc
  • ubuntu-upgrade-linux-image-2-6-20-17-powerpc-smp
  • ubuntu-upgrade-linux-image-2-6-20-17-powerpc64-smp
  • ubuntu-upgrade-linux-image-2-6-20-17-server
  • ubuntu-upgrade-linux-image-2-6-20-17-server-bigiron
  • ubuntu-upgrade-linux-image-2-6-20-17-sparc64
  • ubuntu-upgrade-linux-image-2-6-20-17-sparc64-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-386
  • ubuntu-upgrade-linux-image-2-6-22-15-cell
  • ubuntu-upgrade-linux-image-2-6-22-15-generic
  • ubuntu-upgrade-linux-image-2-6-22-15-hppa32
  • ubuntu-upgrade-linux-image-2-6-22-15-hppa64
  • ubuntu-upgrade-linux-image-2-6-22-15-itanium
  • ubuntu-upgrade-linux-image-2-6-22-15-lpia
  • ubuntu-upgrade-linux-image-2-6-22-15-lpiacompat
  • ubuntu-upgrade-linux-image-2-6-22-15-mckinley
  • ubuntu-upgrade-linux-image-2-6-22-15-powerpc
  • ubuntu-upgrade-linux-image-2-6-22-15-powerpc-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-powerpc64-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-rt
  • ubuntu-upgrade-linux-image-2-6-22-15-server
  • ubuntu-upgrade-linux-image-2-6-22-15-sparc64
  • ubuntu-upgrade-linux-image-2-6-22-15-sparc64-smp
  • ubuntu-upgrade-linux-image-2-6-22-15-ume
  • ubuntu-upgrade-linux-image-2-6-22-15-virtual
  • ubuntu-upgrade-linux-image-2-6-22-15-xen
  • ubuntu-upgrade-linux-image-2-6-24-19-386
  • ubuntu-upgrade-linux-image-2-6-24-19-generic
  • ubuntu-upgrade-linux-image-2-6-24-19-hppa32
  • ubuntu-upgrade-linux-image-2-6-24-19-hppa64
  • ubuntu-upgrade-linux-image-2-6-24-19-itanium
  • ubuntu-upgrade-linux-image-2-6-24-19-lpia
  • ubuntu-upgrade-linux-image-2-6-24-19-lpiacompat
  • ubuntu-upgrade-linux-image-2-6-24-19-mckinley
  • ubuntu-upgrade-linux-image-2-6-24-19-openvz
  • ubuntu-upgrade-linux-image-2-6-24-19-powerpc
  • ubuntu-upgrade-linux-image-2-6-24-19-powerpc-smp
  • ubuntu-upgrade-linux-image-2-6-24-19-powerpc64-smp
  • ubuntu-upgrade-linux-image-2-6-24-19-rt
  • ubuntu-upgrade-linux-image-2-6-24-19-server
  • ubuntu-upgrade-linux-image-2-6-24-19-sparc64
  • ubuntu-upgrade-linux-image-2-6-24-19-sparc64-smp
  • ubuntu-upgrade-linux-image-2-6-24-19-virtual
  • ubuntu-upgrade-linux-image-2-6-24-19-xen

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;