Hide Forgot
Description of problem: Three bytes of uninitialized kernel memory are currently leaked to user. Upstream proposed patch: http://patchwork.ozlabs.org/patch/32830/ CVE request: http://article.gmane.org/gmane.comp.security.oss.general/2060
Upstream commits: http://git.kernel.org/linus/16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=096ed17f20affc2db0e307658c69b67433992a7a
MITRE's CVE-2009-3228 record: ----------------------------- The tc_fill_tclass function in net/sched/sch_api.c in the tc subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.31-rc9 does not initialize certain (1) tcm__pad1 and (2) tcm__pad2 structure members, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors. References: ----------- http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.4.37.y.git;a=commit;h=096ed17f20affc2db0e307658c69b67433992a7a http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=16ebb5e0b36ceadc8186f71d68b0c4fa4b6e781b http://patchwork.ozlabs.org/patch/32830/ http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.37.6 http://www.kernel.org/pub/linux/kernel/v2.6/testing/v2.6.31/ChangeLog-2.6.31-rc9
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2009:1522 https://rhn.redhat.com/errata/RHSA-2009-1522.html
This issue has been addressed in following products: MRG for RHEL-5 Via RHSA-2009:1540 https://rhn.redhat.com/errata/RHSA-2009-1540.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2009:1548 https://rhn.redhat.com/errata/RHSA-2009-1548.html