U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2009-1961

Change History

Modified Analysis by NIST 2/15/2024 3:41:50 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-667
Removed CWE
NIST CWE-362

								
						
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29:git1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29:rc2_git7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29:rc8-kk:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29.rc1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29.rc2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.29.rc2-git1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (including) 2.6.19
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.27 up to (excluding) 2.6.27.24
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.29 up to (excluding) 2.6.29.4
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.30:rc2:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
     *cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise:11.0:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_desktop:11:-:*:*:*:*:*:*
     *cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
Changed Reference Type
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17 No Types Assigned
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17 Broken Link
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html Mailing List
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html Mailing List
Changed Reference Type
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html No Types Assigned
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html Mailing List
Changed Reference Type
http://secunia.com/advisories/35390 No Types Assigned
http://secunia.com/advisories/35390 Broken Link
Changed Reference Type
http://secunia.com/advisories/35394 No Types Assigned
http://secunia.com/advisories/35394 Broken Link
Changed Reference Type
http://secunia.com/advisories/35656 No Types Assigned
http://secunia.com/advisories/35656 Broken Link
Changed Reference Type
http://secunia.com/advisories/35847 No Types Assigned
http://secunia.com/advisories/35847 Broken Link
Changed Reference Type
http://secunia.com/advisories/36051 No Types Assigned
http://secunia.com/advisories/36051 Broken Link
Changed Reference Type
http://securitytracker.com/id?1022307 No Types Assigned
http://securitytracker.com/id?1022307 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.debian.org/security/2009/dsa-1844 No Types Assigned
http://www.debian.org/security/2009/dsa-1844 Mailing List, Patch
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2009:135 Broken Link
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 Broken Link
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/05/29/2 Patch
http://www.openwall.com/lists/oss-security/2009/05/29/2 Mailing List, Patch
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/05/30/1 Exploit, Patch
http://www.openwall.com/lists/oss-security/2009/05/30/1 Exploit, Mailing List, Patch
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/06/02/2 Exploit
http://www.openwall.com/lists/oss-security/2009/06/02/2 Exploit, Mailing List
Changed Reference Type
http://www.openwall.com/lists/oss-security/2009/06/03/1 Exploit
http://www.openwall.com/lists/oss-security/2009/06/03/1 Exploit, Mailing List
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2009-1157.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2009-1157.html Broken Link
Changed Reference Type
http://www.securityfocus.com/bid/35143 Exploit
http://www.securityfocus.com/bid/35143 Broken Link, Exploit, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/usn-793-1 No Types Assigned
http://www.ubuntu.com/usn/usn-793-1 Third Party Advisory