oss-sec mailing list archives

Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt


From: "Steven M. Christey" <coley () linus mitre org>
Date: Sun, 22 Feb 2009 17:20:02 -0500 (EST)


======================================================
Name: CVE-2009-0676
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676
Reference: MLIST:[linux-kernel] 20090212 [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt try #2
Reference: URL:http://lkml.org/lkml/2009/2/12/123
Reference: MLIST:[oss-security] 20090220 CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt
Reference: URL:http://openwall.com/lists/oss-security/2009/02/20/1
Reference: 
CONFIRM:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=df0bca049d01c0ee94afb7cd5dfd959541e6c8da
Reference: CONFIRM:http://patchwork.kernel.org/patch/6816/
Reference: CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=486305
Reference: BID:33846
Reference: URL:http://www.securityfocus.com/bid/33846

The sock_getsockopt function in net/core/sock.c in the Linux kernel
before 2.6.28.6 does not initialize a certain structure member, which
allows local users to obtain potentially sensitive information from
kernel memory via an SO_BSDCOMPAT getsockopt request.



Current thread: