CVE Vulnerabilities

CVE-2010-2955

Off-by-one Error

Published: Sep 08, 2010 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
2.1 MODERATE
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.

Weakness

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*2.6.36 (excluding)
Linux_kernelLinux2.6.36 (including)2.6.36 (including)
Linux_kernelLinux2.6.36-rc1 (including)2.6.36-rc1 (including)
Linux_kernelLinux2.6.36-rc2 (including)2.6.36-rc2 (including)
MRG for RHEL-5RedHatkernel-rt-0:2.6.33.7-rt29.45.el5rt*
Red Hat Enterprise Linux 6RedHatkernel-0:2.6.32-71.7.1.el6*
LinuxUbuntujaunty*
LinuxUbuntukarmic*
LinuxUbuntulucid*
LinuxUbuntumaverick*
LinuxUbuntuupstream*
Linux-armadaxpUbuntuupstream*
Linux-backports-modules-2.6.24Ubuntuhardy*
Linux-backports-modules-2.6.28Ubuntujaunty*
Linux-backports-modules-2.6.32Ubuntulucid*
Linux-ec2Ubuntukarmic*
Linux-ec2Ubuntulucid*
Linux-ec2Ubuntumaverick*
Linux-ec2Ubuntuupstream*
Linux-floUbuntuupstream*
Linux-fsl-imx51Ubuntukarmic*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-goldfishUbuntusaucy*
Linux-goldfishUbuntuupstream*
Linux-grouperUbuntusaucy*
Linux-grouperUbuntuupstream*
Linux-lts-backport-maverickUbuntulucid*
Linux-lts-backport-maverickUbuntuupstream*
Linux-lts-backport-nattyUbuntuupstream*
Linux-lts-backport-oneiricUbuntuupstream*
Linux-lts-quantalUbuntuupstream*
Linux-lts-raringUbuntuupstream*
Linux-lts-saucyUbuntuupstream*
Linux-lts-trustyUbuntuupstream*
Linux-lts-utopicUbuntuupstream*
Linux-lts-vividUbuntuupstream*
Linux-maguroUbuntusaucy*
Linux-maguroUbuntuupstream*
Linux-makoUbuntusaucy*
Linux-makoUbuntuupstream*
Linux-mantaUbuntusaucy*
Linux-mantaUbuntuupstream*
Linux-mvl-doveUbuntukarmic*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntumaverick*
Linux-mvl-doveUbuntuupstream*
Linux-raspi2Ubuntuupstream*
Linux-source-2.6.15Ubuntuupstream*
Linux-ti-omap4Ubuntumaverick*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References