First published: Tue Jun 29 2010(Updated: )
Description of problem: On a 32-bit machine, info.rule_cnt >= 0x40000000 leads to integer overflow and the buffer may be smaller than needed. Since ETHTOOL_GRXCLSRLALL is unprivileged, this can presumably be used for at least denial of service. Reference: <a href="http://thread.gmane.org/gmane.linux.network/164869">http://thread.gmane.org/gmane.linux.network/164869</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.33.7 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2478 is considered a moderate severity vulnerability due to the possibility of denial of service on affected systems.
To fix CVE-2010-2478, upgrade the Linux kernel to a version that is higher than 2.6.33.7 for affected distributions.
CVE-2010-2478 affects various versions of the Linux kernel on Debian, Ubuntu, and SUSE systems.
CVE-2010-2478 requires local access to the affected system, making remote exploitation unlikely.
The primary impact of CVE-2010-2478 is denial of service, which can disrupt the operation of the affected system.