First published: Wed Sep 02 2009(Updated: )
Description of problem: Three bytes of uninitialized kernel memory are currently leaked to user. Upstream proposed patch: <a href="http://patchwork.ozlabs.org/patch/32830/">http://patchwork.ozlabs.org/patch/32830/</a> CVE request: <a href="http://article.gmane.org/gmane.comp.security.oss.general/2060">http://article.gmane.org/gmane.comp.security.oss.general/2060</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.31-rc4 | |
Linux Linux kernel | =2.6.31-rc1 | |
Linux Linux kernel | =2.6.31-rc6 | |
Linux Linux kernel | =2.6.31-rc5 | |
Linux Linux kernel | =2.6.31-rc7 | |
Linux Linux kernel | =2.6.31-rc8 | |
Linux Linux kernel | =2.6.31-rc3 | |
Linux Linux kernel | =2.6.31-rc2 | |
Linux Linux kernel | =2.6.31 | |
Linux Linux kernel | >=2.4.0<2.4.37.6 | |
Linux Linux kernel | >=2.6.0<2.6.31 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =8.10 | |
Canonical Ubuntu Linux | =9.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =6.06 | |
Redhat Enterprise Linux Server | =5.0 | |
Redhat Enterprise Linux Workstation | =5.0 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Eus | =5.4 | |
redhat/kernel-rt | <0:2.6.24.7-137.el5 | 0:2.6.24.7-137.el5 |
redhat/kernel | <0:2.6.18-164.6.1.el5 | 0:2.6.18-164.6.1.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)