Race condition in the tty_fasync function in drivers/char/tty_io.c in the Linux kernel before 2.6.32.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via unknown vectors, related to the put_tty_queue and __f_setown functions. NOTE: the vulnerability was addressed in a different way in 2.6.32.9.
http://www.debian.org/security/2010/dsa-2094
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.32.6
http://www.openwall.com/lists/oss-security/2010/06/15/2
http://www.openwall.com/lists/oss-security/2010/06/15/3
http://www.openwall.com/lists/oss-security/2010/06/15/4
http://www.openwall.com/lists/oss-security/2010/06/15/5
http://www.ubuntu.com/usn/USN-1000-1
OR
OR
OR
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
65101 | Ubuntu 10.04 LTS : linux-lts-backport-maverick vulnerabilities (USN-1083-1) | Nessus | Ubuntu Local Security Checks | critical |
50044 | Ubuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS / 10.10 : linux, linux-ec2, linux-source-2.6.15 vulnerabilities (USN-1000-1) | Nessus | Ubuntu Local Security Checks | critical |
48387 | Debian DSA-2094-1 : linux-2.6 - privilege escalation/denial of service/information leak | Nessus | Debian Local Security Checks | critical |