CVE-2009-4895
Publication date 8 September 2010
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions. NOTE: the vulnerability was addressed in a different way in 2.6.32.9.
From the Ubuntu Security Team
Al Viro discovered a race condition in the TTY driver. A local attacker could exploit this to crash the system, leading to a denial of service.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-source-2.6.15 | ||
Notes
sbeattie
first patch (703625118069f9f8) was reverted and the second patch was used in 2.6.32.9, which fixes the issue "properly".
smb
IMO the races in tty became visible when the BLK was pushed down into the line disciplines and switch to unlocked ioctl in 2.6.26 (04f378b198da233ca0aca341b113dc6579d46123), so Hardy and Dapper are not affected.
Patch details
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.7 · Medium |
Attack vector | Local |
Attack complexity | High |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1000-1
- Linux kernel vulnerabilities
- 19 October 2010
- USN-1074-2
- Linux kernel vulnerabilities
- 28 February 2011