Bug 652517 (CVE-2010-4164) - CVE-2010-4164 kernel: prevent crashing when parsing bad X.25
Summary: CVE-2010-4164 kernel: prevent crashing when parsing bad X.25
Keywords:
Status: NEW
Alias: CVE-2010-4164
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-11-12 05:39 UTC by Eugene Teo (Security Response)
Modified: 2010-11-22 06:19 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description Eugene Teo (Security Response) 2010-11-12 05:39:20 UTC
Description of problem:
On parsing malformed X.25 facilities, decrementing the remaining length
may cause it to underflow.  Since the length is an unsigned integer,
this will result in the loop continuing until the kernel crashes.

This patch adds checks to ensure decrementing the remaining length does
not cause it to wrap around.

http://marc.info/?l=linux-netdev&m=128951543005554&w=2

Acknowledgements:

Red Hat would like to thank Dan Rosenberg for reporting this issue.

Statement:

This issue did not affect the versions of Linux kernel as shipped with Red Hat
Enterprise Linux 4, 5, 6 and Red Hat Enterprise MRG as they did not include
support for CCITT X.25 Packet Layer.

Comment 1 Eugene Teo (Security Response) 2010-11-22 06:19:10 UTC
Upstream commit:
http://git.kernel.org/linus/5ef41308f94dcbb3b7afc56cdef1c2ba53fa5d2f


Note You need to log in before you can comment on or make changes to this bug.