CVE-2010-2478

Priority
Low
Description
Integer overflow in the ethtool_get_rxnfc function in net/core/ethtool.c in
the Linux kernel before 2.6.33.7 on 32-bit platforms allows local users to
cause a denial of service or possibly have unspecified other impact via an
ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value that
triggers a buffer overflow, a different vulnerability than CVE-2010-3084.
Ubuntu-Description
Ben Hutchings discovered that the ethtool interface did not correctly check
certain sizes. A local attacker could perform malicious ioctl calls that
could crash the system, leading to a denial of service.
References
Notes
smb> In Jaunty the structure has no additional members that need hiding. And
smb> in Hardy the (S|G)RXFH functionality is not even implemented. Same in
smb> Dapper.
Assigned-to
smb
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Ubuntu 10.04 LTS (Lucid Lynx):released (2.6.31-608.22)
Ubuntu 11.04 (Natty Narwhal):DNE
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Ubuntu 10.04 LTS (Lucid Lynx):released (2.6.35-25.44~lucid1)
Ubuntu 11.04 (Natty Narwhal):DNE
Package
Upstream:not-affected
Ubuntu 8.04 LTS (Hardy Heron):DNE
Ubuntu 10.04 LTS (Lucid Lynx):DNE
Ubuntu 11.04 (Natty Narwhal):DNE
Package
Upstream:needs-triage
Ubuntu 8.04 LTS (Hardy Heron):DNE
Ubuntu 10.04 LTS (Lucid Lynx):released (2.6.32-309.18)
Ubuntu 11.04 (Natty Narwhal):DNE
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.35-rc5, 2.6.33.7)
Ubuntu 8.04 LTS (Hardy Heron):not-affected
Ubuntu 10.04 LTS (Lucid Lynx):released (2.6.32-25.43)
Ubuntu 11.04 (Natty Narwhal):released
Patches:
Upstream:http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=bf988435bd5b53529f4408a8efb1f433f6ddfda9
Karmic:http://chinstrap.ubuntu.com/~smb/CVEs/CVE-2010-2478/patches/karmic/linux/0001-ethtool-Fix-potential-user-buffer-overflow-for-ETHTOOL.txt
More Information

Valid XHTML 1.0 Strict

Updated: 2012-06-01 15:21:09 UTC (commit 5347)