Bug 186242

Summary: CVE-2006-1343 Small information leak in SO_ORIGINAL_DST
Product: Red Hat Enterprise Linux 4 Reporter: Marcel Holtmann <holtmann>
Component: kernelAssignee: Thomas Graf <tgraf>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: low Docs Contact:
Priority: medium    
Version: 4.0CC: davem, jbaron, rkhan, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,source=netdev,reported=20060304,public=20060304
Fixed In Version: RHSA-2006-0575 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2006-08-10 22:53:03 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 181409    
Attachments:
Description Flags
Example code for showing the problem none

Description Marcel Holtmann 2006-03-22 14:48:37 UTC
It appears sockaddr_in.sin_zero is not zeroed during certain operations
returning IPv4 socket names, namely:

- getsockopt(...SO_ORIGINAL_DST...) (2.4 and 2.6)
  see getorigdst() in net/ipv4/netfilter/ip_conntrack_core.c
  (+ in net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6?!)

- getsockname() and getpeername() (and accept()) (2.4 only)
  see inet_getname() in net/ipv4/af_inet.c

and several unitialized bytes of kernel stack (sizeof(sin_zero) == 6 to be
precise) leak to the userspace.

http://marc.theaimsgroup.com/?l=linux-netdev&m=114148078223594&w=2

Comment 1 Marcel Holtmann 2006-03-22 14:57:52 UTC
Created attachment 126477 [details]
Example code for showing the problem

Comment 4 Jason Baron 2006-04-07 01:53:51 UTC
committed in stream U4 build 34.14. A test kernel with this patch is available
from http://people.redhat.com/~jbaron/rhel4/


Comment 5 Bob Johnson 2006-04-11 16:07:59 UTC
This issue is on Red Hat Engineering's list of planned work items 
for the upcoming Red Hat Enterprise Linux 4.4 release.  Engineering 
resources have been assigned and barring unforeseen circumstances, Red 
Hat intends to include this item in the 4.4 release.

Comment 8 Mike Gahagan 2006-07-14 19:44:11 UTC
looks to be fixed in 40.1.EL, same results as in 2.1


[mgahagan@dhcp59-204 bz186242]$ ./bug 2345
data: 02 00 89 e1 ac 10 3b ce 00 00 00 00 00 00 00 00
data: 02 00 09 29 ac 10 3b cc 00 00 00 00 00 00 00 00
getsockname(as): Protocol not available


Comment 10 Red Hat Bugzilla 2006-08-10 22:53:04 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2006-0575.html