CVE-2010-2478 (retired)

Priority
Description
Integer overflow in the ethtool_get_rxnfc function in net/core/ethtool.c in
the Linux kernel before 2.6.33.7 on 32-bit platforms allows local users to
cause a denial of service or possibly have unspecified other impact via an
ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value that
triggers a buffer overflow, a different vulnerability than CVE-2010-3084.
Ubuntu-Description
Ben Hutchings discovered that the ethtool interface did not correctly check
certain sizes. A local attacker could perform malicious ioctl calls that
could crash the system, leading to a denial of service.
Notes
 smb> In Jaunty the structure has no additional members that need hiding. And
 smb> in Hardy the (S|G)RXFH functionality is not even implemented. Same in
 smb> Dapper.
Assigned-to
smb
Package
Upstream:released (2.6.35~rc5)
Package
Upstream:released (2.6.35~rc5)
Package
Upstream:released (2.6.35~rc5)
Package
Upstream:released (2.6.35~rc5)
More Information

Updated: 2019-03-26 11:52:15 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)