First published: Tue Oct 26 2010(Updated: )
Description of problem: Calling ETHTOOL_GRXCLSRLALL with a large rule_cnt will allocate kernel heap without clearing it. For the one driver (niu) that implements it, it will leave the unused portion of heap unchanged and copy the full contents back to userspace. This is different from <a href="https://access.redhat.com/security/cve/CVE-2010-2478">CVE-2010-2478</a>, but was introduced at the same time (0853ad66, 2.6.27-rc1). Upstream commit: <a href="http://git.kernel.org/linus/ae6df5f96a51818d6376da5307d773baeece4014">http://git.kernel.org/linus/ae6df5f96a51818d6376da5307d773baeece4014</a> Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | >=2.6.27-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-646725 is considered high due to potential exposure of sensitive information.
To fix REDHAT-BUG-646725, you should update the affected Linux kernel to the latest version that addresses this vulnerability.
Red Hat Linux kernel versions from 2.6.27-rc1 and later are affected by REDHAT-BUG-646725.
REDHAT-BUG-646725 is a heap memory allocation vulnerability that can lead to information disclosure.
Currently, the recommended action is to apply the available kernel updates since there are no effective workarounds to mitigate REDHAT-BUG-646725.