First published: Wed Nov 10 2010(Updated: )
Description of problem: Upstream commit dab5855 ("perf_counter: Add mmap event hooks to mprotect()") is fundamentally wrong as mprotect_fixup() can free 'vma' due to merging. Fix the problem by moving perf_event_mmap() hook to mprotect_fixup(). In certain scenario, a local, unprivileged user could use this flaw to trigger a denial of service. Upstream commit: <a href="http://git.kernel.org/linus/63bfd7384b119409685a17d5c58f0b56e5dc03da">http://git.kernel.org/linus/63bfd7384b119409685a17d5c58f0b56e5dc03da</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.37 | |
Linux Kernel | =2.6.37 | |
Linux Kernel | =2.6.37-rc1 | |
Fedora | =13 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4169 has not been assigned a specific severity rating, but it poses a risk due to its potential exploitation by local, unprivileged users.
To fix CVE-2010-4169, you should upgrade your Linux kernel to a version greater than 2.6.37.
CVE-2010-4169 affects various distributions, including Debian's linux-2.6, Fedora 13, and openSUSE 11.3.
No, CVE-2010-4169 requires local access for exploitation, as it affects unprivileged local users.
CVE-2010-4169 could allow an unprivileged user to affect system performance and stability through improper handling of memory protection.