First published: Wed Nov 10 2010(Updated: )
Description of problem: Both PPPoL2TP (in net/l2tp/l2tp_ppp.c, pppol2tp_sendmsg()) and IPoL2TP (in net/l2tp/l2tp_ip.c, l2tp_ip_sendmsg()) make calls to sock_wmalloc() that perform arithmetic on the size argument without any maximum bound. As a result, by issuing sendto() calls with very large sizes, this allocation size will wrap and result in a small buffer being allocated, leading to ugliness immediately after (probably kernel panics due to bad sk_buff tail position, but possibly kernel heap corruption). Reference: <a href="http://www.spinics.net/lists/netdev/msg145673.html">http://www.spinics.net/lists/netdev/msg145673.html</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Linux kernel | <2.6.36.2 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
openSUSE openSUSE | =11.2 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.