CVE-2010-5332

In the Linux kernel before 2.6.37, an out of bounds array access happened in drivers/net/mlx4/port.c. When searching for a free entry in either mlx4_register_vlan() or mlx4_register_mac(), and there is no free entry, the loop terminates without updating the local variable free thus causing out of array bounds access.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:23

Type Values Removed Values Added
References () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0926f91083f34d047abc74f1ca4fa6a9c161f7db - Patch, Vendor Advisory () https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0926f91083f34d047abc74f1ca4fa6a9c161f7db - Patch, Vendor Advisory
References () https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/0926f91083f34d047abc74f1ca4fa6a9c161f7db - Patch, Third Party Advisory
References () https://mirrors.edge.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 - Broken Link () https://mirrors.edge.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 - Broken Link
References () https://support.f5.com/csp/article/K04146019 - Third Party Advisory () https://support.f5.com/csp/article/K04146019 - Third Party Advisory
References () https://support.f5.com/csp/article/K04146019?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K04146019?utm_source=f5support&amp%3Butm_medium=RSS -

07 Nov 2023, 02:06

Type Values Removed Values Added
References
  • {'url': 'https://support.f5.com/csp/article/K04146019?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K04146019?utm_source=f5support&utm_medium=RSS', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://support.f5.com/csp/article/K04146019?utm_source=f5support&amp%3Butm_medium=RSS -

Information

Published : 2019-07-27 22:15

Updated : 2024-11-21 01:23


NVD link : CVE-2010-5332

Mitre link : CVE-2010-5332

CVE.ORG link : CVE-2010-5332


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer