First published: Tue Oct 26 2010(Updated: )
Description of problem: Calling ETHTOOL_GRXCLSRLALL with a large rule_cnt will allocate kernel heap without clearing it. For the one driver (niu) that implements it, it will leave the unused portion of heap unchanged and copy the full contents back to userspace. This is different from <a href="https://access.redhat.com/security/cve/CVE-2010-2478">CVE-2010-2478</a>, but was introduced at the same time (0853ad66, 2.6.27-rc1). Upstream commit: <a href="http://git.kernel.org/linus/ae6df5f96a51818d6376da5307d773baeece4014">http://git.kernel.org/linus/ae6df5f96a51818d6376da5307d773baeece4014</a> Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.36 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3861 is classified as a medium severity vulnerability.
To fix CVE-2010-3861, ensure that your Linux kernel is updated to version 2.6.36 or later.
CVE-2010-3861 affects various distributions of the Linux kernel, including Debian, openSUSE, and Ubuntu.
CVE-2010-3861 exploits the kernel heap allocation without clearing unused portions when calling the ETHTOOL_GRXCLSRLALL.
CVE-2010-3861 may lead to information disclosure, but its exploitability depends on the specific system configuration.