Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-3228

Опубликовано: 19 окт. 2009
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 2.1

Описание

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

2.6.24-26.64
intrepid

released

2.6.27-16.44
jaunty

released

2.6.28-17.58
karmic

not-affected

upstream

released

2.6.31~rc9

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-55.81
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

released

2.6.31~rc9

Показывать по

EPSS

Процентиль: 24%
0.00077
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.

nvd
почти 16 лет назад

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.

debian
почти 16 лет назад

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem ...

github
больше 3 лет назад

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.

oracle-oval
почти 16 лет назад

ELSA-2009-1548: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 24%
0.00077
Низкий

2.1 Low

CVSS2