First published: Thu Nov 04 2010(Updated: )
Description of problem: In bcm_connect() (in net/can/bcm.c), there is the following code: sprintf(bo->procname, "%p", sock); "procname" is a 9-byte char array. On 64-bit platforms, up to 17 bytes may be copied into the buffer. Fortunately, structure padding will most likely prevent this from being a problem, except for the trailing NULL byte, which may overwrite the first byte of the next heap object. Reference: <a href="http://www.spinics.net/lists/netdev/msg145791.html">http://www.spinics.net/lists/netdev/msg145791.html</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Linux kernel | <2.6.36.2 | |
Fedoraproject Fedora | =13 | |
openSUSE openSUSE | =11.2 | |
openSUSE openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
Suse Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
Debian Debian Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.