Release date:
Updated on:
Affected Systems:
Debian Linux 5.0 x
Linux kernel 2.6.x
Ubuntu Linux 10.04
Description:
--------------------------------------------------------------------------------
Bugtraq id: 46073
Cve id: CVE-2010-4649
Linux Kernel is the Kernel used by open source Linux.
In Linux Kernel's "ib_uverbs_poll_cq ()" implementation, an integer overflow vulnerability exists. Attackers can exploit this vulnerability to execute arbitrary code with higher privileges, cause the affected Kernel to crash, and cause denial of service to legitimate users.
If the user space is included in the larger cmd. ne, ib_uverbs_poll_cq () code, an integer overflow occurs. Calling kmalloc () will allocate a smaller buffer, leading to memory corruption. If resp is not used, information leakage may occur. Although only the RDMA device using this function exists currently, the function will also be called if the user space is not authorized.
<* Source: Jason Gunthorpe
Link: https://bugzilla.redhat.com/show_bug.cgi? Id = 667916
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Debian
------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.debian.org/security/
Linux
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.kernel.org/