2.1

CVE-2009-3228

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.4.0 < 2.4.37.6
LinuxLinux Kernel Version >= 2.6.0 < 2.6.31
LinuxLinux Kernel Version2.6.31 Update-
LinuxLinux Kernel Version2.6.31 Updaterc1
LinuxLinux Kernel Version2.6.31 Updaterc2
LinuxLinux Kernel Version2.6.31 Updaterc3
LinuxLinux Kernel Version2.6.31 Updaterc4
LinuxLinux Kernel Version2.6.31 Updaterc5
LinuxLinux Kernel Version2.6.31 Updaterc6
LinuxLinux Kernel Version2.6.31 Updaterc7
LinuxLinux Kernel Version2.6.31 Updaterc8
CanonicalUbuntu Linux Version6.06
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version8.10
CanonicalUbuntu Linux Version9.04
CanonicalUbuntu Linux Version9.10
RedhatEnterprise Linux Eus Version5.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.201
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE-909 Missing Initialization of Resource

The product does not initialize a critical resource.

http://www.openwall.com/lists/oss-security/2009/09/05/2
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2009/09/06/2
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2009/09/07/2
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2009/09/17/1
Patch
Third Party Advisory
Mailing List
http://www.openwall.com/lists/oss-security/2009/09/17/9
Patch
Third Party Advisory
Mailing List
http://patchwork.ozlabs.org/patch/32830/
Patch
Third Party Advisory
http://www.openwall.com/lists/oss-security/2009/09/03/1
Patch
Third Party Advisory
Mailing List
http://www.securitytracker.com/id?1023073
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=520990
Patch
Third Party Advisory
Issue Tracking