First published: Tue Jan 25 2011(Updated: )
If the iowarrior devices in this case statement support more than 8 bytes per report, it is possible to write past the end of a kernel heap allocation. This will probably never be possible, but change the allocation to be more defensive anyway. Upstream commit: <a href="http://git.kernel.org/linus/3ed780117dbe5acb64280d218f0347f238dafed0">http://git.kernel.org/linus/3ed780117dbe5acb64280d218f0347f238dafed0</a> Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
debian/user-mode-linux | ||
Linux Kernel | <2.6.37 | |
Ubuntu Linux | =8.04 | |
Linux kernel | <2.6.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4656 has a medium severity rating due to potential heap overflow risks.
To mitigate CVE-2010-4656, update to a patched version of the Linux kernel or apply relevant security patches.
CVE-2010-4656 affects various Linux kernel versions prior to 2.6.37 and specific distributions like Ubuntu 8.04.
CVE-2010-4656 is a heap overflow vulnerability associated with improper handling of input from iowarrior devices.
Exploitation of CVE-2010-4656 would likely require local access or specific conditions, making remote exploitation unlikely.