Description
The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1927-1 | New Linux 2.6.26 packages fix several vulnerabilities |
Debian DSA |
DSA-1928-1 | New Linux 2.6.24 packages fix several vulnerabilities |
Debian DSA |
DSA-1929-1 | New Linux 2.6.18 packages fix several vulnerabilities |
EUVD |
EUVD-2009-3211 | The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors. |
Ubuntu USN |
USN-864-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:22:23.283Z
Reserved: 2009-09-16T00:00:00.000Z
Link: CVE-2009-3228
No data.
Status : Modified
Published: 2009-10-19T20:00:00.610
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-3228
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN