First published: Fri Jan 07 2011(Updated: )
In ib_uverbs_poll_cq() code there is a potential integer overflow if userspace passes in a large cmd.ne. The calls to kmalloc() would allocate smaller buffers than intended, leading to memory corruption. There iss also an information leak if resp wasn't all used. Unprivileged userspace may call this function, although only if an RDMA device that uses this function is present. Fix this by copying CQ entries one at a time, which avoids the allocation entirely, and also by moving this copying into a function that makes sure to initialize all memory copied to userspace. Upstream commit: <a href="http://git.kernel.org/linus/7182afea8d1afd432a17c18162cc3fd441d0da93">http://git.kernel.org/linus/7182afea8d1afd432a17c18162cc3fd441d0da93</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
debian/user-mode-linux | ||
Linux Linux kernel | <2.6.37 | |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Eus | =5.6 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =5.6 | |
Redhat Enterprise Linux Workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.