{ "id": "CVE-2009-3228", "sourceIdentifier": "cve@mitre.org", "published": "2009-10-19T20:00:00.610", "lastModified": "2023-11-07T02:04:23.580", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors." }, { "lang": "es", "value": "La funci\u00f3n tc_fill_tclass en net/sched/sch_api.c del subsistema tc en el kernel de Linux v2.4.x anteriores a la v2.4.37.6 y v2.6.x anteriores a la v2.6.31-rc9 no inicializa un determinado miembro de la estructura (1) tcm__pad1 y (2) tcm__pad2, lo que permite a atacantes locales obtener informaci\u00f3n confidencial de la memoria del kernel a trav\u00e9s de vectores de ataque sin especificar." } ], "vendorComments": [ { "organization": "Red Hat", "comment": "This issue was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-1522.html , https://rhn.redhat.com/errata/RHSA-2009-1548 and https://rhn.redhat.com/errata/RHSA-2009-1540 respectively.\n\nIt has been rated as having moderate security impact and is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.\n\nFor further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/\n", "lastModified": "2009-11-04T00:00:00" } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1 }, "baseSeverity": "LOW", "exploitabilityScore": 3.9, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-909" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.4.0", "versionEndExcluding": "2.4.37.6", "matchCriteriaId": "9E1FDE50-BE6F-44A9-9A66-C8B0EDB10923" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.0", "versionEndExcluding": "2.6.31", "matchCriteriaId": "EDDD2288-DF54-44E9-A60B-A7FFDCCC694F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:-:*:*:*:*:*:*", "matchCriteriaId": "2887290A-1B43-4DB9-A9D0-B0B56CD78E48" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc1:*:*:*:*:*:*", "matchCriteriaId": "29C4A364-ED36-4AC8-AD1E-8BD18DD9324D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc2:*:*:*:*:*:*", "matchCriteriaId": "4049867A-E3B2-4DC1-8966-0477E6A5D582" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc3:*:*:*:*:*:*", "matchCriteriaId": "A2507858-675B-4DA2-A49E-00DB54700CF3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc4:*:*:*:*:*:*", "matchCriteriaId": "0A25EA55-3F1C-440C-A383-0BB9556C9508" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc5:*:*:*:*:*:*", "matchCriteriaId": "B2665356-4EF5-4543-AD15-67FDB851DCCD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc6:*:*:*:*:*:*", "matchCriteriaId": "26E7609B-B058-496D-ACDD-7F69FBDE89E5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc7:*:*:*:*:*:*", "matchCriteriaId": "210BF049-8B3C-4ACC-BF8E-2C3551477602" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.31:rc8:*:*:*:*:*:*", "matchCriteriaId": "1837F32C-80D3-4E10-AE5D-E9F5A11A434E" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB" }, { "vulnerable": true, "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0" } ] } ] }, { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "4DD6917D-FE03-487F-9F2C-A79B5FCFBC5A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E" } ] } ] } ], "references": [ { "url": "http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git%3Ba=commit%3Bh=096ed17f20affc2db0e307658c69b67433992a7a", "source": "cve@mitre.org" }, { "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b", "source": "cve@mitre.org" }, { "url": "http://lists.vmware.com/pipermail/security-announce/2010/000082.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://patchwork.ozlabs.org/patch/32830/", "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/37084", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/38794", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://secunia.com/advisories/38834", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6", "source": "cve@mitre.org", "tags": [ "Broken Link" ] }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc9", "source": "cve@mitre.org", "tags": [ "Broken Link" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/09/03/1", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/09/05/2", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/09/06/2", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/09/07/2", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/09/17/1", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.openwall.com/lists/oss-security/2009/09/17/9", "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ] }, { "url": "http://www.redhat.com/support/errata/RHSA-2009-1522.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.securitytracker.com/id?1023073", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.ubuntu.com/usn/usn-864-1", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2010/0528", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=520990", "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6757", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9409", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://rhn.redhat.com/errata/RHSA-2009-1540.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://rhn.redhat.com/errata/RHSA-2009-1548.html", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] } ] }