CVE-2008-5395
Publication date 9 December 2008
Last updated 24 July 2024
Ubuntu priority
The parisc_show_stack function in arch/parisc/kernel/traps.c in the Linux kernel before 2.6.28-rc7 on PA-RISC allows local users to cause a denial of service (system crash) via vectors associated with an attempt to unwind a stack that contains userspace addresses.
From the Ubuntu Security Team
Helge Deller discovered that PA-RISC stack unwinding was not handled correctly. A local attacker could exploit this to crash the system, leading do a denial of service. This did not affect official Ubuntu kernels, but was fixed in the source for anyone performing HPPA kernel builds.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | 8.10 intrepid |
Fixed 2.6.27-11.27
|
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy | Not in release | |
6.06 LTS dapper | Not in release | |
linux-source-2.6.15 | 8.10 intrepid | Not in release |
8.04 LTS hardy | Not in release | |
7.10 gutsy | Not in release | |
6.06 LTS dapper |
Not affected
|
|
linux-source-2.6.22 | 8.10 intrepid | Not in release |
8.04 LTS hardy | Not in release | |
7.10 gutsy |
Not affected
|
|
6.06 LTS dapper | Not in release |
Notes
smb
The call do dump_stack was not added before v2.6.25-rc6. So the resulting panic will not happen.