First published: Thu Nov 25 2010(Updated: )
<a href="http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread">http://kerneltrap.org/mailarchive/linux-netdev/2010/3/3/6271093/thread</a> "The root cause for this problem is, when the receiver is doing __release_sock() (i.e. after userspace recv, kernel udp_recvmsg->skb_free_datagram_locked->release_sock), it moves skbs from backlog to sk_receive_queue with the softirq enabled. In the above case, multiple busy senders will almost make it an endless loop. The skbs in the backlog end up eat all the system memory. The issue is not only for UDP. Any protocols using socket backlog is potentially affected. The patch adds limit for socket backlog so that the backlog size cannot be expanded endlessly." Upstream commits: <a href="http://git.kernel.org/linus/2499849ee8f513e795b9f2c19a42d6356e4943a4">http://git.kernel.org/linus/2499849ee8f513e795b9f2c19a42d6356e4943a4</a> <a href="http://git.kernel.org/linus/53eecb1be5ae499d399d2923933937a9ea1a284f">http://git.kernel.org/linus/53eecb1be5ae499d399d2923933937a9ea1a284f</a> <a href="http://git.kernel.org/linus/50b1a782f845140f4138f14a1ce8a4a6dd0cc82f">http://git.kernel.org/linus/50b1a782f845140f4138f14a1ce8a4a6dd0cc82f</a> <a href="http://git.kernel.org/linus/79545b681961d7001c1f4c3eb9ffb87bed4485db">http://git.kernel.org/linus/79545b681961d7001c1f4c3eb9ffb87bed4485db</a> <a href="http://git.kernel.org/linus/55349790d7cbf0d381873a7ece1dcafcffd4aaa9">http://git.kernel.org/linus/55349790d7cbf0d381873a7ece1dcafcffd4aaa9</a> <a href="http://git.kernel.org/linus/6b03a53a5ab7ccf2d5d69f96cf1c739c4d2a8fb9">http://git.kernel.org/linus/6b03a53a5ab7ccf2d5d69f96cf1c739c4d2a8fb9</a> <a href="http://git.kernel.org/linus/8eae939f1400326b06d0c9afe53d2a484a326871">http://git.kernel.org/linus/8eae939f1400326b06d0c9afe53d2a484a326871</a> <a href="http://git.kernel.org/linus/a3a858ff18a72a8d388e31ab0d98f7e944841a62">http://git.kernel.org/linus/a3a858ff18a72a8d388e31ab0d98f7e944841a62</a> <a href="http://git.kernel.org/linus/c377411f2494a931ff7facdbb3a6839b1266bcf6">http://git.kernel.org/linus/c377411f2494a931ff7facdbb3a6839b1266bcf6</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.34 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.0 | |
Red Hat Enterprise Linux | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4251 is classified as a medium severity vulnerability.
To remediate CVE-2010-4251, update the Linux kernel to version 2.6.34 or later.
CVE-2010-4251 affects various Linux kernel versions prior to 2.6.34, VMware ESX 4.0 and 4.1, as well as Red Hat Enterprise Linux 4.0.
CVE-2010-4251 is a vulnerability related to improper handling of UDP socket messages.
Yes, CVE-2010-4251 can potentially be exploited by an attacker remotely through crafted UDP packets.