Bug 452478 (CVE-2008-2826) - CVE-2008-2826 kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow
Summary: CVE-2008-2826 kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2008-2826
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 452479 452480 452482 452483 453138
Blocks:
TreeView+ depends on / blocked
 
Reported: 2008-06-23 10:46 UTC by Jan Lieskovsky
Modified: 2019-09-29 12:25 UTC (History)
8 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2010-12-23 21:10:39 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2008:0585 0 normal SHIPPED_LIVE Important: kernel security and bug fix update 2008-08-26 19:56:57 UTC

Description Jan Lieskovsky 2008-06-23 10:46:47 UTC
Description of problem:

kernel: sctp: Make sure N * sizeof(union sctp_addr) does not overflow.

As noticed by Gabriel Campana, the kmalloc() length arg
passed in by sctp_getsockopt_local_addrs_old() can overflow
if ->addr_num is large enough.

Therefore, enforce an appropriate limit.

Version-Release number of selected component (if applicable):
All 2.6.* versions of the Linux kernel.

Proposed upstream patch:

http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=735ce972fbc8a65fb17788debd7bbe7b4383cc62

Comment 4 Jan Lieskovsky 2008-06-30 13:59:25 UTC
Official statement of the Red Hat Security Response Team to CVE-2008-2826:

Gabriel Campana discovered a possible integer overflow in the Linux 
kernel Stream Control Transmission Protocol (SCTP) implementation. In 
the latest upstream (vanilla) kernels, this deficiency could lead to 
privilege escalation. Since earlier kernels, such as those shipped with 
Red Hat Enterprise Linux 2.1, 3, 4 and 5, use a different mechanism for 
processing the relevant data structure, these kernels are not vulnerable 
to the mentioned vulnerability.

Although the bug does not have a security consequence for the current 
Red Hat Enterprise Linux kernels, we plan to fix it in future kernel 
updates.

Comment 11 Vincent Danen 2010-12-23 21:10:39 UTC
This was addressed via:

MRG Realtime for RHEL 5 Server (RHSA-2008:0585)


Note You need to log in before you can comment on or make changes to this bug.