CVE-2006-1343

N/A Unknown
Published: March 21, 2006 Modified: April 16, 2026
View on NVD

Description

net/ipv4/netfilter/ip_conntrack_core.c in Linux kernel 2.4 and 2.6, and possibly net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c in 2.6, does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the getsockopt function with SO_ORIGINAL_DST, which allows local users to obtain portions of potentially sensitive memory.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=linux-netdev&m=114148078223594&w=2
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/19357
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/19955
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/20671
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/21045
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/21136
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/21465
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/21983
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/22093
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/22417
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://secunia.com/advisories/22875
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.debian.org/security/2006/dsa-1097
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.debian.org/security/2006/dsa-1184
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.osvdb.org/29841
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.redhat.com/support/errata/RHSA-2006-0437.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.redhat.com/support/errata/RHSA-2006-0575.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.redhat.com/support/errata/RHSA-2006-0579.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.redhat.com/support/errata/RHSA-2006-0580.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.securityfocus.com/archive/1/435490/100/0/threaded
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.securityfocus.com/bid/17203
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.trustix.org/errata/2006/0032/
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.vmware.com/download/esx/esx-202-200610-patch.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.vmware.com/download/esx/esx-213-200610-patch.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.vmware.com/download/esx/esx-254-200610-patch.html
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.vupen.com/english/advisories/2006/2071
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://www.vupen.com/english/advisories/2006/4502
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
https://exchange.xforce.ibmcloud.com/vulnerabilities/25425
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
https://usn.ubuntu.com/281-1/
Source: bc94ec7e-8909-4cbb-83df-d2fc9330fa88
http://marc.info/?l=linux-netdev&m=114148078223594&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19357
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19955
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20671
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21045
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21136
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21465
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21983
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22093
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22417
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/22875
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1097
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1184
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:123
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/29841
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0437.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0575.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0579.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0580.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/435490/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/451419/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17203
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.trustix.org/errata/2006/0032/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/download/esx/esx-202-200610-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/download/esx/esx-213-200610-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/download/esx/esx-254-200610-patch.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2071
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/4502
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/25425
Source: af854a3a-2127-422b-91ae-364da2661108
https://usn.ubuntu.com/281-1/
Source: af854a3a-2127-422b-91ae-364da2661108

74 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.1%
28th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

linux