1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
|
Candidate: CVE-2009-0676
PublicDate: 2009-02-22
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6
http://www.ubuntu.com/usn/usn-751-1
http://www.ubuntu.com/usn/usn-752-1
Description:
The sock_getsockopt function in net/core/sock.c in the Linux kernel before
2.6.28.6 does not initialize a certain structure member, which allows local
users to obtain potentially sensitive information from kernel memory via an
SO_BSDCOMPAT getsockopt request.
Ubuntu-Description:
The getsockopt function did not correctly clear certain parameters. A
local attacker could read leaked kernel memory, leading to a loss of
privacy.
Notes:
mdeslaur> PoC: http://patchwork.kernel.org/patch/6816/
Bugs:
Priority: medium
Discovered-by:
Assigned-to:
Patches_linux-source-2.6.15:
upstream_linux-source-2.6.15: released (2.6.29~rc5)
dapper_linux-source-2.6.15: released (2.6.15-54.76)
gutsy_linux-source-2.6.15: DNE
hardy_linux-source-2.6.15: DNE
intrepid_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE
Patches_linux-source-2.6.22:
upstream_linux-source-2.6.22: released (2.6.29~rc5)
dapper_linux-source-2.6.22: DNE
gutsy_linux-source-2.6.22: released (2.6.22-16.62)
hardy_linux-source-2.6.22: DNE
intrepid_linux-source-2.6.22: DNE
devel_linux-source-2.6.22: DNE
Patches_linux:
upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=df0bca049d01c0ee94afb7cd5dfd959541e6c8da
upstream_linux: released (2.6.29~rc5)
dapper_linux: DNE
gutsy_linux: DNE
hardy_linux: released (2.6.24-23.52)
intrepid_linux: released (2.6.27-11.31)
devel_linux: not-affected
|