CVE-2009-3228

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.1 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 23%
VendorProductVersion
linuxlinux_kernel
2.4.0 ≤
𝑥
< 2.4.37.6
linuxlinux_kernel
2.6.0 ≤
𝑥
< 2.6.31
linuxlinux_kernel
2.6.31
linuxlinux_kernel
2.6.31:rc1
linuxlinux_kernel
2.6.31:rc2
linuxlinux_kernel
2.6.31:rc3
linuxlinux_kernel
2.6.31:rc4
linuxlinux_kernel
2.6.31:rc5
linuxlinux_kernel
2.6.31:rc6
linuxlinux_kernel
2.6.31:rc7
linuxlinux_kernel
2.6.31:rc8
canonicalubuntu_linux
6.06
canonicalubuntu_linux
8.04
canonicalubuntu_linux
8.10
canonicalubuntu_linux
9.04
canonicalubuntu_linux
9.10
redhatenterprise_linux_desktop
5.0
redhatenterprise_linux_eus
5.4
redhatenterprise_linux_server
5.0
redhatenterprise_linux_workstation
5.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
karmic
not-affected
jaunty
Fixed 2.6.28-17.58
released
intrepid
Fixed 2.6.27-16.44
released
hardy
Fixed 2.6.24-26.64
released
dapper
dne
linux-source-2.6.15
karmic
dne
jaunty
dne
intrepid
dne
hardy
dne
dapper
Fixed 2.6.15-55.81
released
References