CVE-2010-2478

Priority
Low
Description
Integer overflow in the ethtool_get_rxnfc function in net/core/ethtool.c in
the Linux kernel before 2.6.33.7 on 32-bit platforms allows local users to
cause a denial of service or possibly have unspecified other impact via an
ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value that
triggers a buffer overflow, a different vulnerability than CVE-2010-3084.
Ubuntu-Description
Ben Hutchings discovered that the ethtool interface did not correctly check
certain sizes. A local attacker could perform malicious ioctl calls that
could crash the system, leading to a denial of service.
References
Notes
 smb> In Jaunty the structure has no additional members that need hiding. And
 smb> in Hardy the (S|G)RXFH functionality is not even implemented. Same in
 smb> Dapper.
Assigned-to
smb
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:not-affected
Package
Upstream:needs-triage
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.35-rc5, 2.6.33.7)
Patches:
Upstream:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bf988435bd5b53529f4408a8efb1f433f6ddfda9
Karmic:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-2478/patches/karmic/linux/0001-ethtool-Fix-potential-user-buffer-overflow-for-ETHTOOL.txt
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:38:43 UTC (commit 9756)