CVE-2009-3620
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
22/10/2009
Last modified:
09/04/2025
Description
The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.90
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.31.1 (excluding) | |
| cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* | ||
| cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redhat:mrg_realtime:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:suse:linux_enterprise_debuginfo:10:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:10:sp3:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:-:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://article.gmane.org/gmane.linux.kernel/892259
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D7dc482dfeeeefcfd000d4271c4626937406756d7
- http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
- http://lists.vmware.com/pipermail/security-announce/2010/000082.html
- http://secunia.com/advisories/36707
- http://secunia.com/advisories/37909
- http://secunia.com/advisories/38794
- http://secunia.com/advisories/38834
- http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A088
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A198
- http://www.openwall.com/lists/oss-security/2009/10/19/1
- http://www.openwall.com/lists/oss-security/2009/10/19/3
- http://www.redhat.com/support/errata/RHSA-2009-1670.html
- http://www.redhat.com/support/errata/RHSA-2009-1671.html
- http://www.redhat.com/support/errata/RHSA-2010-0882.html
- http://www.securityfocus.com/bid/36824
- http://www.ubuntu.com/usn/usn-864-1
- http://www.vupen.com/english/advisories/2010/0528
- https://bugzilla.redhat.com/show_bug.cgi?id=529597
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891
- https://rhn.redhat.com/errata/RHSA-2009-1540.html
- https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html
- http://article.gmane.org/gmane.linux.kernel/892259
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D7dc482dfeeeefcfd000d4271c4626937406756d7
- http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html
- http://lists.vmware.com/pipermail/security-announce/2010/000082.html
- http://secunia.com/advisories/36707
- http://secunia.com/advisories/37909
- http://secunia.com/advisories/38794
- http://secunia.com/advisories/38834
- http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.31-git11.log
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A088
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A198
- http://www.openwall.com/lists/oss-security/2009/10/19/1
- http://www.openwall.com/lists/oss-security/2009/10/19/3
- http://www.redhat.com/support/errata/RHSA-2009-1670.html
- http://www.redhat.com/support/errata/RHSA-2009-1671.html
- http://www.redhat.com/support/errata/RHSA-2010-0882.html
- http://www.securityfocus.com/bid/36824
- http://www.ubuntu.com/usn/usn-864-1
- http://www.vupen.com/english/advisories/2010/0528
- https://bugzilla.redhat.com/show_bug.cgi?id=529597
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6763
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9891
- https://rhn.redhat.com/errata/RHSA-2009-1540.html
- https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00190.html



