The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter.  NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:29
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://osvdb.org/45909 - | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=232045 - | 
07 Nov 2023, 02:00
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer. | 
Information
                Published : 2007-09-18 19:17
Updated : 2025-04-09 00:30
NVD link : CVE-2007-1865
Mitre link : CVE-2007-1865
CVE.ORG link : CVE-2007-1865
JSON object : View
Products Affected
                redhat
- enterprise_linux
CWE
                
                    
                        
                        CWE-189
                        
            Numeric Errors
