Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-0676

Опубликовано: 22 фев. 2009
Источник: debian
EPSS Низкий

Описание

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.29-1package
linux-2.6.24unfixedpackage

Примечания

  • Original fix was incomplete/risky, see:

  • <http://marc.info/?l=linux-kernel&m=123540732700371&w=2>

  • Reproducer in <https://bugzilla.redhat.com/show_bug.cgi?id=486305>

  • lacks initialzer for len. Leak confirmed with fixed reproducer.

EPSS

Процентиль: 39%
0.00169
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.

redhat
больше 16 лет назад

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.

nvd
больше 16 лет назад

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.

github
около 3 лет назад

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.

fstec
больше 10 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить целостность защищаемой информации

EPSS

Процентиль: 39%
0.00169
Низкий