National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2009-3228 Detail

Description

The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.

Source:  MITRE      Last Modified:  10/19/2009

Quick Info

CVE Dictionary Entry:
CVE-2009-3228
Original release date:
10/19/2009
Last revised:
09/18/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.9 MEDIUM
Vector:
(AV:L/AC:L/Au:N/C:C/I:N/A:N) (legend)
Impact Subscore:
6.9
Exploitability Subscore:
3.9
CVSS Version 2 Metrics:
Access Vector:
Locally exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

Vendor Statements (disclaimer)

Official Statement from Red Hat (11/04/2009)

This issue was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via: https://rhn.redhat.com/errata/RHSA-2009-1522.html , https://rhn.redhat.com/errata/RHSA-2009-1548 and https://rhn.redhat.com/errata/RHSA-2009-1540 respectively. It has been rated as having moderate security impact and is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed. For further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=096ed17f20affc2db0e307658c69b67433992a7a Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=096ed17f20affc2db0e307658c69b67433992a7a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b Patch External Source CONFIRM http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b
http://lists.vmware.com/pipermail/security-announce/2010/000082.html External Source MLIST [security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
http://patchwork.ozlabs.org/patch/32830/ Patch External Source CONFIRM http://patchwork.ozlabs.org/patch/32830/
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6 Vendor Advisory External Source CONFIRM http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6
http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc9 Patch; Vendor Advisory External Source CONFIRM http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc9
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 External Source MANDRIVA MDVSA-2010:198
http://www.openwall.com/lists/oss-security/2009/09/03/1 Patch External Source MLIST [oss-security] 20090903 CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/05/2 Patch External Source MLIST [oss-security] 20090905 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/06/2 Patch External Source MLIST [oss-security] 20090906 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/07/2 Patch External Source MLIST [oss-security] 20090907 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/17/1 Patch External Source MLIST [oss-security] 20090916 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.openwall.com/lists/oss-security/2009/09/17/9 Patch External Source MLIST [oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak
http://www.redhat.com/support/errata/RHSA-2009-1522.html External Source REDHAT RHSA-2009:1522
http://www.securitytracker.com/id?1023073 External Source SECTRACK 1023073
http://www.ubuntu.com/usn/usn-864-1 External Source UBUNTU USN-864-1
http://www.vupen.com/english/advisories/2010/0528 External Source VUPEN ADV-2010-0528
https://bugzilla.redhat.com/show_bug.cgi?id=520990 External Source CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=520990
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6757 External Source OVAL oval:org.mitre.oval:def:6757
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9409 External Source OVAL oval:org.mitre.oval:def:9409
https://rhn.redhat.com/errata/RHSA-2009-1540.html External Source REDHAT RHSA-2009:1540
https://rhn.redhat.com/errata/RHSA-2009-1548.html External Source REDHAT RHSA-2009:1548

References to Check Content

Identifier:
oval:org.mitre.oval:def:6757
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6757
Identifier:
oval:org.mitre.oval:def:9409
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:9409

Technical Details

Vulnerability Type (View All)

  • Information Leak / Disclosure (CWE-200)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.31:-rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.42:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.43:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.44:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.45:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.46:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.47:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.48:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.49:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16.50:*:*:*:*:*:*:*
Configuration 2
Showing 100 of 442 CPEs, view all CPEs here.

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 3 change records found - show changes