CVE-2009-0675

N/A Unknown
Published: February 22, 2009 Modified: April 23, 2026
View on NVD

Description

The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/33938
Source: cve@mitre.org
Vendor Advisory
http://lists.openwall.net/netdev/2009/01/28/90
Source: af854a3a-2127-422b-91ae-364da2661108
http://openwall.com/lists/oss-security/2009/02/20/2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33758
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33938
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/34394
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34502
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34680
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34981
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35011
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35394
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37471
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1749
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1787
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1794
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.6
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:071
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0326.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-0360.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-751-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.redhat.com/show_bug.cgi?id=486534
Source: af854a3a-2127-422b-91ae-364da2661108

54 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.2%
38th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux