First published: Wed Nov 10 2010(Updated: )
Description of problem: Both PPPoL2TP (in net/l2tp/l2tp_ppp.c, pppol2tp_sendmsg()) and IPoL2TP (in net/l2tp/l2tp_ip.c, l2tp_ip_sendmsg()) make calls to sock_wmalloc() that perform arithmetic on the size argument without any maximum bound. As a result, by issuing sendto() calls with very large sizes, this allocation size will wrap and result in a small buffer being allocated, leading to ugliness immediately after (probably kernel panics due to bad sk_buff tail position, but possibly kernel heap corruption). Reference: <a href="http://www.spinics.net/lists/netdev/msg145673.html">http://www.spinics.net/lists/netdev/msg145673.html</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.36.2 | |
openSUSE | =11.2 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4160 has a high severity level due to the potential for integer overflow vulnerabilities in the Linux kernel.
To fix CVE-2010-4160, update the Linux kernel to a version that addresses this vulnerability.
CVE-2010-4160 affects various versions of the Linux kernel and specific distributions such as Debian and openSUSE.
CVE-2010-4160 is classified as an integer overflow vulnerability affecting the PPPoL2TP and IPoL2TP protocols.
Yes, CVE-2010-4160 can potentially be exploited remotely through crafted sendto() calls.