First published: Fri Nov 20 2009(Updated: )
Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=2.6.31.6 | |
Linux Kernel | =2.6.32 | |
Linux Kernel | =2.6.32-rc1 | |
Linux Kernel | =2.6.32-rc3 | |
Linux Kernel | =2.6.32-rc4 | |
Linux Kernel | =2.6.32-rc5 | |
openSUSE | =11.1 | |
openSUSE | =11.2 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp2 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp3 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =10-sp3 | |
Debian GNU/Linux | =4.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
VMware ESX | =3.5 | |
Red Hat Enterprise Virtualization | =5.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =5.4 | |
redhat enterprise Linux server | =5.0 | |
Red Hat Enterprise Linux Server Workstation | =5.0 | |
Fedora | =10 | |
Debian | =4.0 | |
Ubuntu | =9.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.10 | |
Ubuntu | =8.04 | |
Ubuntu | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3080 has a medium to high severity level as it allows local users to cause a denial of service or potentially gain privileges.
To fix CVE-2009-3080, update the Linux kernel to version 2.6.32-rc8 or later.
CVE-2009-3080 affects various Linux kernel versions prior to 2.6.32-rc8, including 2.6.31.6 and earlier release candidates.
CVE-2009-3080 is an array index error vulnerability located in the gdth_read_event function in the Linux kernel.
CVE-2009-3080 cannot be exploited remotely as it requires local access to the system.