Bug 491787 (CVE-2009-1046)
Summary: | CVE-2009-1046 kernel: utf8 selection memory corruption | ||||||
---|---|---|---|---|---|---|---|
Product: | [Other] Security Response | Reporter: | Eugene Teo (Security Response) <eteo> | ||||
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> | ||||
Status: | CLOSED ERRATA | QA Contact: | |||||
Severity: | medium | Docs Contact: | |||||
Priority: | medium | ||||||
Version: | unspecified | CC: | bhu, jlieskov, lgoncalv, williams | ||||
Target Milestone: | --- | Keywords: | Security | ||||
Target Release: | --- | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2021-10-19 09:06:33 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | 491788 | ||||||
Bug Blocks: | |||||||
Attachments: |
|
Description
Eugene Teo (Security Response)
2009-03-24 03:02:42 UTC
Created attachment 336418 [details] Upstream patch http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=878b8619f711280fd05845e21956434b5e588cc4 CVSS2 score of medium, 4.7 (AV:L/AC:M/Au:N/C:N/I:N/A:C) The attacker needs to be at console to exploit this. Common Vulnerabilities and Exposures assigned an identifier CVE-2009-1046 to this vulnerability: The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "an off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046 http://lists.openwall.net/linux-kernel/2009/01/30/333 http://lists.openwall.net/linux-kernel/2009/02/02/364 http://www.openwall.com/lists/oss-security/2009/02/12/10 http://www.openwall.com/lists/oss-security/2009/02/12/11 http://www.openwall.com/lists/oss-security/2009/02/12/9 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.4 http://www.securityfocus.com/bid/33672 This issue has been addressed in following products: MRG for RHEL-5 Via RHSA-2009:0451 https://rhn.redhat.com/errata/RHSA-2009-0451.html |