First published: Fri Jan 07 2011(Updated: )
In ib_uverbs_poll_cq() code there is a potential integer overflow if userspace passes in a large cmd.ne. The calls to kmalloc() would allocate smaller buffers than intended, leading to memory corruption. There iss also an information leak if resp wasn't all used. Unprivileged userspace may call this function, although only if an RDMA device that uses this function is present. Fix this by copying CQ entries one at a time, which avoids the allocation entirely, and also by moving this copying into a function that makes sure to initialize all memory copied to userspace. Upstream commit: <a href="http://git.kernel.org/linus/7182afea8d1afd432a17c18162cc3fd441d0da93">http://git.kernel.org/linus/7182afea8d1afd432a17c18162cc3fd441d0da93</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
debian/user-mode-linux | ||
Linux Kernel | <2.6.37 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server | =5.6 | |
Red Hat Enterprise Linux Server EUS | =5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4649 has a severity rating that indicates a potential for memory corruption and information disclosure.
To fix CVE-2010-4649, ensure that your Linux kernel is updated to version 2.6.37 or later.
CVE-2010-4649 affects unprivileged userspace while using certain versions of the Linux kernel.
CVE-2010-4649 is associated with memory corruption and information leakage vulnerabilities.
Exploiting CVE-2010-4649 could lead to memory corruption and potential exposure of sensitive information.