First published: Mon May 19 2008(Updated: )
Description of problem: Backport the feature length validation. Without this it's possible for rlen to ovelflow to 0, causing kmalloc(0), and a heap overflow during DCCP feature reconciliation. rlen = 1 + opt->dccpop_len; rpref = kmalloc(rlen, GFP_ATOMIC); memcpy(&rpref[1], opt->dccpop_val, opt->dccpop_len); Thanks to Brandon Edwards of McAfee Avert labs for discovering this issue. Impact: A vulnerability exists in the DCCP implementation which can be setup and exploited by a local attacker. The vulnerability is an integer overflow which leads to a kmalloc() for 0 bytes, followed by a memory copy into the returned pointer for 255 bytes, which causes a heap overflow. This type of vulnerability can be exploited by a local attacker to gain arbitrary code execution. Version-Release number of selected component (if applicable): 2.6.17 <= x <= 2.6.20 (See the timeline for more details) Additional information: This vulnerability affects the dccp kernel module (shipped as part of the RHEL kernel updates).
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | >=2.6.17<=2.6.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-447389 is high due to potential heap overflow vulnerabilities.
To fix REDHAT-BUG-447389, you should apply the latest security patches provided by Red Hat for the affected kernel versions.
Versions of the Red Hat Linux kernel from 2.6.17 to 2.6.20 are affected by REDHAT-BUG-447389.
REDHAT-BUG-447389 is a heap overflow vulnerability related to DCCP feature reconciliation.
There is no public information indicating that REDHAT-BUG-447389 is actively being exploited, but it is advisable to address it promptly.