Upstream information
Description
net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having low severity.
National Vulnerability Database | |
---|---|
Base Score | 2.1 |
Vector | AV:L/AC:L/Au:N/C:P/I:N/A:N |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | None |
Note from the SUSE Security Team on the kernel-default package
SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details.SUSE Bugzilla entry: 159046 [RESOLVED / FIXED]
No SUSE Security Announcements cross referenced.
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 01:59:44 2013CVE page last modified: Mon Mar 17 16:13:24 2025