CVE-2010-4160
Bug #711855 reported by
Andy Whitcroft
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Medium
|
Andy Whitcroft | ||
Dapper |
Won't Fix
|
Medium
|
Andy Whitcroft | ||
Hardy |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Karmic |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Lucid |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Maverick |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Natty |
Invalid
|
Medium
|
Andy Whitcroft | ||
linux-fsl-imx51 (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Hardy |
Invalid
|
Undecided
|
Unassigned | ||
Karmic |
Won't Fix
|
Undecided
|
Unassigned | ||
Lucid |
Won't Fix
|
Undecided
|
Paolo Pisati | ||
Maverick |
Invalid
|
Undecided
|
Unassigned | ||
Natty |
Invalid
|
Undecided
|
Unassigned |
Bug Description
Multiple integer overflows in the (1) pppol2tp_sendmsg function in
net/l2tp/
net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the
Linux kernel before 2.6.36.2 allow local users to cause a denial of service
(heap memory corruption and panic) or possibly gain privileges via a
crafted sendto call.
CVE References
- 2010-0435
- 2010-2943
- 2010-3296
- 2010-3297
- 2010-3448
- 2010-3698
- 2010-3699
- 2010-3848
- 2010-3849
- 2010-3850
- 2010-3858
- 2010-3859
- 2010-3865
- 2010-3873
- 2010-3874
- 2010-3875
- 2010-3876
- 2010-3877
- 2010-3880
- 2010-4072
- 2010-4074
- 2010-4078
- 2010-4079
- 2010-4080
- 2010-4081
- 2010-4082
- 2010-4083
- 2010-4157
- 2010-4160
- 2010-4165
- 2010-4169
- 2010-4248
Changed in linux (Ubuntu Hardy): | |
assignee: | nobody → Andy Whitcroft (apw) |
Changed in linux (Ubuntu Dapper): | |
assignee: | nobody → Andy Whitcroft (apw) |
Changed in linux (Ubuntu Karmic): | |
assignee: | nobody → Andy Whitcroft (apw) |
Changed in linux (Ubuntu Dapper): | |
status: | Fix Released → Fix Committed |
tags: |
added: kernel-cve-tracking-bug removed: kernel-cve-tracker |
Changed in linux (Ubuntu Dapper): | |
status: | Fix Committed → Won't Fix |
To post a comment you must log in.
This is fixed by the following two commits:
commit 8acfe468b0384e8 34a303f08ebc495 3d72fb690a
Author: David S. Miller <email address hidden>
Date: Thu Oct 28 11:41:55 2010 -0700
net: Limit socket I/O iovec total length to INT_MAX.
This helps protect us from overflow issues down in the
individual protocol sendmsg/recvmsg handlers. Once
we hit INT_MAX we truncate out the rest of the iovec
by setting the iov_len members to zero.
This works because:
1) For SOCK_STREAM and SOCK_SEQPACKET sockets, partial
writes are allowed and the application will just continue
with another write to send the rest of the data.
2) For datagram oriented sockets, where there must be a
one-to-one correspondance between write() calls and
packets on the wire, INT_MAX is going to be far larger
than the packet size limit the protocol is going to
check for and signal with -EMSGSIZE.
Based upon a patch by Linus Torvalds.
Signed-off-by: David S. Miller <email address hidden>
commit 253eacc070b114c 2ec1f81b067d2fe d7305467b0
Author: Linus Torvalds <email address hidden>
Date: Sat Oct 30 16:43:10 2010 -0700
net: Truncate recvfrom and sendto length to INT_MAX.
Signed-off-by: Linus Torvalds <email address hidden>
Signed-off-by: David S. Miller <email address hidden>