summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2009-0676
blob: 06d60465f2080eeeaed7d9a51b09012513160e5b (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
Candidate: CVE-2009-0676
Description:
 The sock_getsockopt function in net/core/sock.c in the Linux kernel
 before 2.6.28.6 does not initialize a certain structure member, which
 allows local users to obtain potentially sensitive information from
 kernel memory via an SO_BSDCOMPAT getsockopt request. 
References:
 MLIST:[linux-kernel] 20090212 [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt try #2
 URL:http://lkml.org/lkml/2009/2/12/123
 MLIST:[oss-security] 20090220 CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt
 URL:http://openwall.com/lists/oss-security/2009/02/20/1
 CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=df0bca049d01c0ee94afb7cd5dfd959541e6c8da
 CONFIRM:http://patchwork.kernel.org/patch/6816/
 CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6
 CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=486305
Ubuntu-Description:
Notes:
Bugs:
upstream: released (2.6.28.6, 2.6.29-rc5)
linux-2.6: released (2.6.29-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-24etch1) [bugfix/all/net-SO_BSDCOMPAT-leak.patch, bugfix/all/net-SO_BSDCOMPAT-leak-2.patch]
2.6.24-etch-security: released (2.6.24-6~etchnhalf.8etch1) [bugfix/all/net-SO_BSDCOMPAT-leak.patch, bugfix/all/net-SO_BSDCOMPAT-leak-2.patch]
2.6.26-lenny-security: released (2.6.26-13lenny1) [bugfix/all/net-SO_BSDCOMPAT-leak.patch, bugfix/all/net-SO_BSDCOMPAT-leak-2.patch]
2.6.15-dapper-security:
2.6.22-gutsy-security:
2.6.24-hardy-security:
2.6.27-intrepid-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy