CVE Reference: CVE-2010-3904

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2010-3904

Description:
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/USN-1000-1

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
  http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
  http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html

ST
  1024613

SAID
  Secunia Advisory: SA46397

REDHAT
  http://www.redhat.com/support/errata/RHSA-2010-0792.html
  http://www.redhat.com/support/errata/RHSA-2010-0842.html

MISC
  http://www.vsecurity.com/resources/advisory/20101019-1/
  http://www.vsecurity.com/download/tools/linux-rds-exploit.c

CONFIRM
  http://www.vmware.com/security/advisories/VMSA-2011-0012.html
  http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
  http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=799c10559d60f159ab2232203f222f18fa3c4a5f

CERT-VN
  362983

BUGTRAQ
  http://www.securityfocus.com/archive/1/archive/1/520102/100/0/threaded


Return to the previous page.