7.2
CVSSv2

CVE-2009-3080

Published: 20/11/2009 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel prior to 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

linux linux kernel 2.6.32

opensuse opensuse 11.1

opensuse opensuse 11.2

suse linux enterprise desktop 10

suse linux enterprise server 10

debian debian linux 4.0

canonical ubuntu linux 9.04

canonical ubuntu linux 8.10

canonical ubuntu linux 9.10

canonical ubuntu linux 8.04

canonical ubuntu linux 6.06

vmware esx 3.5

redhat enterprise linux server 5.0

redhat enterprise linux desktop 5.0

redhat enterprise linux eus 5.4

redhat virtualization 5.0

redhat enterprise linux server workstation 5.0

redhat fedora 10

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 5This update has been rated as having important security impact by the RedHat Secu ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and three bugsare now available for Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Securi ...
It was discovered that the AX25 network subsystem did not correctly check integer signedness in certain setsockopt calls A local attacker could exploit this to crash the system, leading to a denial of service Ubuntu 910 was not affected (CVE-2009-2909) ...
NOTE: This kernel update marks the final planned kernel security update for the 2618 kernel in the Debian release 'etch' Although security support for 'etch' officially ended on Feburary 15th, 2010, this update was already in preparation before that date A final update that includes fixes for these issues in the 2624 kernel is also in prepara ...
NOTE: This kernel update marks the final planned kernel security update for the 2624 kernel in the Debian release 'etch' Although security support for 'etch' officially ended on Feburary 15th, 2010, this update was already in preparation before that date Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial ...

References

CWE-129http://www.securityfocus.com/bid/37068http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.32-rc8http://secunia.com/advisories/37435http://secunia.com/advisories/37720https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00777.htmlhttp://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.htmlhttp://secunia.com/advisories/37909http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.htmlhttp://secunia.com/advisories/38017http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.htmlhttp://www.redhat.com/support/errata/RHSA-2010-0041.htmlhttps://rhn.redhat.com/errata/RHSA-2010-0046.htmlhttps://rhn.redhat.com/errata/RHSA-2010-0095.htmlhttp://support.avaya.com/css/P8/documents/100073666http://www.mandriva.com/security/advisories?name=MDVSA-2010:030http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.htmlhttp://www.ubuntu.com/usn/usn-864-1http://secunia.com/advisories/38276http://www.debian.org/security/2010/dsa-2005http://www.redhat.com/support/errata/RHSA-2010-0882.htmlhttp://www.vmware.com/security/advisories/VMSA-2011-0009.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:051https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7101https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12862https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10989http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=690e744869f3262855b83b4fb59199cf142765b0https://access.redhat.com/errata/RHSA-2010:0046https://nvd.nist.govhttps://usn.ubuntu.com/864-1/