CVE-2008-7256
Publication date 3 June 2010
Last updated 24 July 2024
Ubuntu priority
mm/shmem.c in the Linux kernel before 2.6.28-rc8, when strict overcommit is enabled and CONFIG_SECURITY is disabled, does not properly handle the export of shmemfs objects by knfsd, which allows attackers to cause a denial of service (NULL pointer dereference and knfsd crash) or possibly have unspecified other impact via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1643.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | 10.04 LTS lucid |
Not affected
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Not affected
|
|
8.04 LTS hardy |
Fixed 2.6.24-28.73
|
|
6.06 LTS dapper | Not in release | |
linux-source-2.6.15 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty | Not in release | |
8.04 LTS hardy | Not in release | |
6.06 LTS dapper |
Fixed 2.6.15-55.86
|
Patch details
Package | Patch details |
---|---|
linux | |
linux-source-2.6.15 |
References
Related Ubuntu Security Notices (USN)
- USN-966-1
- Linux kernel vulnerabilities
- 4 August 2010