First published: Mon Dec 06 2010(Updated: )
If igb's SR-IOV and promiscuous mode are enabled and the interface receives a tag VLAN packet, this will result in a null pointer dereference. To fix this, we will backport upstream commit 31b24b95 to ensure that vlan_gro_receive is only used if vlans have been registered to the adapter structure. [ This fixes bugzilla entry 15582 -Eric Dumazet] It matters if CONFIG_PCI_IOV is enabled, e.g. grep -ir SRIOV drivers/net/igb/*. Upstream commit: <a href="http://git.kernel.org/linus/31b24b95">http://git.kernel.org/linus/31b24b95</a> References: <a href="https://bugzilla.kernel.org/show_bug.cgi?id=15582">https://bugzilla.kernel.org/show_bug.cgi?id=15582</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.34 | |
VMware ESX | =3.0.0 | |
VMware ESX | =3.0.1 | |
VMware ESX | =3.0.2 | |
VMware ESX | =3.0.3 | |
VMware ESX | =3.5 | |
VMware ESX | =3.5-update1 | |
VMware ESX | =3.5-update2 | |
VMware ESX | =3.5-update3 | |
VMware ESX | =4.0 | |
VMware ESX | =4.1 | |
VMware ESXi | =3.5 | |
VMware ESXi | =3.5-1 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.0-1 | |
VMware ESXi | =4.0-2 | |
VMware ESXi | =4.0-3 | |
VMware ESXi | =4.0-4 | |
VMware ESXi | =4.1 | |
VMware ESXi | =4.1-1 | |
VMware ESXi | =4.1-2 | |
VMware ESXi | =5.0 | |
VMware ESXi | =5.0-1 | |
VMware ESXi | =5.0-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4263 has a medium severity rating due to its potential to cause denial of service through null pointer dereference.
To fix CVE-2010-4263, backport upstream commit 31b24b95 to your system to ensure vlan_gro_receive is only used with registered VLANs.
CVE-2010-4263 affects several versions of the Linux Kernel and VMware ESX/ESXi, specifically multiple versions up to 4.1.
The impact of CVE-2010-4263 may lead to system crashes or unresponsive states due to the null pointer dereference when handling VLAN packets.
Yes, there is a patch available that includes a backported commit to mitigate the vulnerability in affected systems.