First published: Mon Aug 30 2010(Updated: )
Description of problem: This problem was originally tracked down by Brad Spengler. When calling wireless ioctls, if a driver does not correctly validate/shrink iwp->length, the resulting copy_to_user can leak up to 64K of kernel heap contents. It seems that this is triggerable[1] in 2.6.32 at least on ath5k, but I was not able to track down how. The twisty maze of ioctl handlers stumped me. :) Other drivers I checked did not appear to have any problems, but the potential remains. I'm not sure if this patch is the right approach; it was fixed differently[2] in grsecurity. [1] <a href="http://forums.grsecurity.net/viewtopic.php?f=3&t=2290&start=0">http://forums.grsecurity.net/viewtopic.php?f=3&t=2290&start=0</a> [2] <a href="http://grsecurity.net/~spender/wireless-infoleak-fix2.patch">http://grsecurity.net/~spender/wireless-infoleak-fix2.patch</a> Discussion: <a href="http://lkml.org/lkml/2010/8/27/413">http://lkml.org/lkml/2010/8/27/413</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Linux kernel | <2.6.36 | |
Linux Linux kernel | =2.6.36 | |
Linux Linux kernel | =2.6.36-rc1 | |
Linux Linux kernel | =2.6.36-rc2 | |
openSUSE openSUSE | =11.1 | |
SUSE Linux Enterprise Desktop | =11 | |
Suse Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11 | |
Canonical Ubuntu Linux | =6.06 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =9.10 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.