First published: Thu Nov 04 2010(Updated: )
Description of problem: In bcm_connect() (in net/can/bcm.c), there is the following code: sprintf(bo->procname, "%p", sock); "procname" is a 9-byte char array. On 64-bit platforms, up to 17 bytes may be copied into the buffer. Fortunately, structure padding will most likely prevent this from being a problem, except for the trailing NULL byte, which may overwrite the first byte of the next heap object. Reference: <a href="http://www.spinics.net/lists/netdev/msg145791.html">http://www.spinics.net/lists/netdev/msg145791.html</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.36.2 | |
Fedora | =13 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Debian | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3874 is classified as a medium severity vulnerability due to the potential buffer overflow risk on 64-bit systems.
To fix CVE-2010-3874, ensure that you update to a patched version of the Linux kernel that is above version 2.6.36.2.
CVE-2010-3874 affects various Linux distributions including Debian, Fedora, and openSUSE versions detailed in the vulnerability description.
CVE-2010-3874 is a buffer overflow vulnerability found in the bcm_connect function of the Linux kernel CAN (Controller Area Network) subsystem.
As of now, there are no publicly known exploits specifically targeting CVE-2010-3874, but it is advisable to patch vulnerable systems.