First published: Tue Mar 01 2011(Updated: )
Description of problem: Struct ca is copied from userspace. It is not checked whether the "device" field is NULL terminated. This potentially leads to BUG() inside of alloc_netdev_mqs() and/or information leak by creating a device with a name made of contents of kernel stack. References: <a href="http://seclists.org/oss-sec/2011/q1/309">http://seclists.org/oss-sec/2011/q1/309</a> <a href="https://lkml.org/lkml/2011/2/14/50">https://lkml.org/lkml/2011/2/14/50</a> Acknowledgements: Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-681260 relates to potential information leakage and system instability due to improper handling of device names.
To fix REDHAT-BUG-681260, ensure that the 'device' field is properly NULL terminated when copied from userspace.
The consequences of REDHAT-BUG-681260 include kernel crashes and unintended exposure of sensitive kernel stack data.
REDHAT-BUG-681260 is present in specific Red Hat Linux kernel versions; users should verify against their installed kernel version.
Yes, REDHAT-BUG-681260 has been acknowledged by Red Hat and is being addressed in future kernel updates.