First published: Thu Oct 08 2009(Updated: )
Quote from <a href="http://patchwork.ozlabs.org/patch/35412/">http://patchwork.ozlabs.org/patch/35412/</a>: Commit 9ef1d4c7c7aca1cd436612b6ca785b726ffb8ed8 introduced a typo in initialization.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:2.6.24.7-137.el5 | 0:2.6.24.7-137.el5 |
redhat/kernel | <0:2.6.18-164.9.1.el5 | 0:2.6.18-164.9.1.el5 |
Linux Kernel | <=2.4.37.6 | |
Linux Kernel | >=2.6.0<2.6.32 | |
Linux Kernel | =2.6.32 | |
Linux Kernel | =2.6.32-rc1 | |
Linux Kernel | =2.6.32-rc2 | |
Linux Kernel | =2.6.32-rc3 | |
Linux Kernel | =2.6.32-rc4 | |
openSUSE | =11.0 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Software Development Kit | =10-sp2 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Red Hat Fedora | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2009-3612 is classified as a medium severity vulnerability due to its potential impact on the Linux kernel's netlink subsystem.
To fix CVE-2009-3612, you should update your Linux kernel to a version that is patched against this vulnerability.
CVE-2009-3612 affects various distributions including certain versions of Red Hat, openSUSE, SUSE Linux Enterprise, and Ubuntu.
CVE-2009-3612 exploits a typo in the initialization of the tcf_fill_node function within the netlink subsystem of the Linux kernel.
CVE-2009-3612 impacts Linux kernel versions prior to 2.6.32 and certain 2.6.x versions including those specified in the advisory.