CVE-2009-0676

Publication date 22 February 2009

Last updated 24 July 2024


Ubuntu priority

The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.

From the Ubuntu Security Team

The getsockopt function did not correctly clear certain parameters. A local attacker could read leaked kernel memory, leading to a loss of privacy.

Read the notes from the security team

Status

Package Ubuntu Release Status

Notes


mdeslaur

PoC: http://patchwork.kernel.org/patch/6816/

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details

References

Related Ubuntu Security Notices (USN)

    • USN-752-1
    • Linux kernel vulnerabilities
    • 7 April 2009
    • USN-751-1
    • Linux kernel vulnerabilities
    • 6 April 2009

Other references