Description
net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1097-1 | New Kernel 2.4.27 packages fix several vulnerabilities |
Debian DSA |
DSA-1184-1 | New Linux 2.6.8 packages fix several vulnerabilities |
Debian DSA |
DSA-1184-2 | New Linux 2.6.8 packages fix several vulnerabilities |
EUVD |
EUVD-2006-1347 | net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory. |
Ubuntu USN |
USN-281-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: sgi
Published:
Updated: 2024-08-07T17:12:20.681Z
Reserved: 2006-03-21T00:00:00.000Z
Link: CVE-2006-1343
No data.
Status : Modified
Published: 2006-03-21T18:02:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2006-1343
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN