First published: Wed Sep 02 2009(Updated: )
Description of problem: Three bytes of uninitialized kernel memory are currently leaked to user. Upstream proposed patch: <a href="http://patchwork.ozlabs.org/patch/32830/">http://patchwork.ozlabs.org/patch/32830/</a> CVE request: <a href="http://article.gmane.org/gmane.comp.security.oss.general/2060">http://article.gmane.org/gmane.comp.security.oss.general/2060</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:2.6.24.7-137.el5 | 0:2.6.24.7-137.el5 |
redhat/kernel | <0:2.6.18-164.6.1.el5 | 0:2.6.18-164.6.1.el5 |
Linux Kernel | >=2.4.0<2.4.37.6 | |
Linux Kernel | >=2.6.0<2.6.31 | |
Linux Kernel | =2.6.31 | |
Linux Kernel | =2.6.31-rc1 | |
Linux Kernel | =2.6.31-rc2 | |
Linux Kernel | =2.6.31-rc3 | |
Linux Kernel | =2.6.31-rc4 | |
Linux Kernel | =2.6.31-rc5 | |
Linux Kernel | =2.6.31-rc6 | |
Linux Kernel | =2.6.31-rc7 | |
Linux Kernel | =2.6.31-rc8 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =5.4 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2009-3228 has a moderate severity level as it involves leakage of uninitialized kernel memory.
To fix CVE-2009-3228, apply the proposed patch available from the upstream source.
CVE-2009-3228 affects specific versions of the Linux kernel including those from 2.4.0 up to 2.6.31.
CVE-2009-3228 is caused by uninitialized memory being inadvertently leaked to user space.
CVE-2009-3228 does not pose a direct remote exploitation vector but may aid in local privilege escalation.