[CVE-2008-3276] Linux kernel dccp_setsockopt_change() integer overflow

Bug #258180 reported by Till Ulen
254
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Low
Tim Gardner
Feisty
Invalid
Undecided
Unassigned
Gutsy
Invalid
Undecided
Unassigned
Hardy
Fix Released
Undecided
Unassigned
linux-source-2.6.20 (Ubuntu)
Invalid
Low
Tim Gardner
Feisty
Won't Fix
Undecided
Unassigned
Gutsy
Invalid
Undecided
Unassigned
Hardy
Invalid
Undecided
Unassigned
linux-source-2.6.22 (Ubuntu)
Invalid
Low
Tim Gardner
Feisty
Invalid
Undecided
Unassigned
Gutsy
Fix Released
Undecided
Unassigned
Hardy
Invalid
Undecided
Unassigned

Bug Description

Eugene Teo of Red Hat Security Response Team wrote:

"An integer overflow flaw was found in the Linux kernel
dccp_setsockopt_change() function. The vulnerability exists due to a
lack of sanitisation performed on a user-controlled integer value before
the value is employed as the size argument of a memory allocation
operation. An attacker may leverage this vulnerability to trigger a
kernel panic on a victim's machine remotely.

This affects kernel versions since 2.6.17-rc1. The proposed upstream
commit is: 3e8a0a559c66ee9e7468195691a56fefc3589740

I have allocated this CVE-2008-3276."

http://www.openwall.com/lists/oss-security/2008/08/15/3

CVE References

Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux-source-2.6.20:
assignee: nobody → timg-tpi
importance: Undecided → Low
status: New → Fix Committed
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux-source-2.6.22:
assignee: nobody → timg-tpi
status: New → Fix Committed
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux:
assignee: nobody → timg-tpi
importance: Undecided → Low
status: New → Fix Committed
milestone: none → ubuntu-8.04.2
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux-source-2.6.22:
importance: Undecided → Low
Kees Cook (kees)
Changed in linux:
status: Fix Committed → Fix Released
status: New → Fix Released
status: New → Invalid
status: New → Invalid
Changed in linux-source-2.6.20:
status: Fix Committed → Invalid
Revision history for this message
Kees Cook (kees) wrote :
Changed in linux-source-2.6.20:
status: New → Won't Fix
status: New → Invalid
status: New → Invalid
Changed in linux-source-2.6.22:
status: New → Invalid
status: New → Invalid
status: New → Fix Released
status: Fix Committed → Invalid
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.