No analysis available yet.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 5 | |||
| kernel-0:2.6.18-194.el5 | cpe:/o:redhat:enterprise_linux:5 | RHSA-2010:0178 | 2010-03-29T00:00:00Z |
| Red Hat Enterprise Linux 5.4.Z - Server Only | |||
| kernel-0:2.6.18-164.17.1.el5 | cpe:/o:redhat:rhel_eus:5.4 | RHSA-2010:0380 | 2010-04-27T00:00:00Z |
No data available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2443-1 | linux-2.6 security update |
EUVD |
EUVD-2009-4275 | The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value). |
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.03356.
Key SSVC decision points have not yet been added.
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:01:19.746Z
Reserved: 2009-12-12T00:00:00.000Z
Link: CVE-2009-4307
No data.
Status : Deferred
Published: 2009-12-13T01:30:00.437
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-4307
OpenCVE Enrichment
No data.
Debian DSA
EUVD