First published: Fri Nov 12 2010(Updated: )
Description of problem: On parsing malformed X.25 facilities, decrementing the remaining length may cause it to underflow. Since the length is an unsigned integer, this will result in the loop continuing until the kernel crashes. This patch adds checks to ensure decrementing the remaining length does not cause it to wrap around. <a href="http://marc.info/?l=linux-netdev&m=128951543005554&w=2">http://marc.info/?l=linux-netdev&m=128951543005554&w=2</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue. Statement: This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, 6 and Red Hat Enterprise MRG as they did not include support for CCITT X.25 Packet Layer.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.36.2 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =10-sp3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Software Development Kit | =10-sp3 | |
Debian GNU/Linux | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4164 is categorized as a medium severity vulnerability due to the potential for kernel crashes.
To fix CVE-2010-4164, apply the appropriate security patches for your affected Linux kernel version.
CVE-2010-4164 affects various versions of the Linux kernel, including specific versions of Debian and openSUSE.
CVE-2010-4164 involves a denial of service vulnerability caused by underflow when parsing malformed X.25 facilities.
Yes, CVE-2010-4164 can potentially be exploited remotely if a malicious user can send malformed X.25 packets.