First published: Thu Sep 16 2010(Updated: )
Description of problem: A vulnerability in the 32-bit compatibility layer for 64-bit systems was reported. It is caused by insecure allocation of user space memory when translating system call inputs to 64-bit. A stack pointer underflow can occur when using the "compat_alloc_user_space" method with an arbitrary length input. Reference: <a href="http://sota.gen.nz/compat1/">http://sota.gen.nz/compat1/</a> Upstream commit: <a href="http://git.kernel.org/linus/c41d68a513c71e35a14f66d71782d27a79a81ea6">http://git.kernel.org/linus/c41d68a513c71e35a14f66d71782d27a79a81ea6</a> Acknowledgements: Red Hat would like to thank Ben Hawkes for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-634457 is considered high due to the risk of stack pointer underflow in user space memory allocation.
To fix REDHAT-BUG-634457, ensure you update the Red Hat Kernel to the latest patched version that addresses this vulnerability.
Users of the 32-bit compatibility layer in 64-bit Red Hat Linux systems are affected by REDHAT-BUG-634457.
The impact of REDHAT-BUG-634457 may include potential unauthorized access to system resources or crashes due to invalid memory operations.
Currently, there are no known workarounds for REDHAT-BUG-634457 other than applying the necessary kernel updates.