CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
86.0%
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes “garbage” memory to be sent.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | 2.6.24.4 | cpe:2.3:o:linux:linux_kernel:2.6.24.4:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.24.5 | cpe:2.3:o:linux:linux_kernel:2.6.24.5:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.24.6 | cpe:2.3:o:linux:linux_kernel:2.6.24.6:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.24.7 | cpe:2.3:o:linux:linux_kernel:2.6.24.7:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.25 | cpe:2.3:o:linux:linux_kernel:2.6.25:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.25.1 | cpe:2.3:o:linux:linux_kernel:2.6.25.1:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.25.2 | cpe:2.3:o:linux:linux_kernel:2.6.25.2:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.25.3 | cpe:2.3:o:linux:linux_kernel:2.6.25.3:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.25.4 | cpe:2.3:o:linux:linux_kernel:2.6.25.4:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.25.5 | cpe:2.3:o:linux:linux_kernel:2.6.25.5:*:*:*:*:*:*:* |
bugzilla.kernel.org/show_bug.cgi?id=10423
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=83e0bbcbe2145f160fbaa109b0439dae7f4a38a9
lists.opensuse.org/opensuse-security-announce/2009-05/msg00002.html
lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html
lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html
lists.opensuse.org/opensuse-security-announce/2009-06/msg00002.html
osvdb.org/53571
osvdb.org/53630
osvdb.org/53631
secunia.com/advisories/34981
secunia.com/advisories/35011
secunia.com/advisories/35121
secunia.com/advisories/35185
secunia.com/advisories/35387
secunia.com/advisories/35390
secunia.com/advisories/35394
secunia.com/advisories/35656
www.debian.org/security/2009/dsa-1787
www.debian.org/security/2009/dsa-1794
www.debian.org/security/2009/dsa-1800
www.mandriva.com/security/advisories?name=MDVSA-2009:119
www.mandriva.com/security/advisories?name=MDVSA-2009:135
www.openwall.com/lists/oss-security/2009/04/08/2
www.securityfocus.com/bid/34654
www.ubuntu.com/usn/usn-793-1