SB2010120601 - Improper input validation in Linux kernel rds
Published: December 6, 2010 Updated: June 20, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2010-3904)
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to improper input validation error within the rds_page_copy_user() function in net/rds/page.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=799c10559d60f159ab2232203f222f18fa3c4a5f
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
- http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html
- http://secunia.com/advisories/46397
- http://securitytracker.com/id?1024613
- http://www.kb.cert.org/vuls/id/362983
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
- http://www.redhat.com/support/errata/RHSA-2010-0792.html
- http://www.redhat.com/support/errata/RHSA-2010-0842.html
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
- http://www.ubuntu.com/usn/USN-1000-1
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- http://www.vsecurity.com/download/tools/linux-rds-exploit.c
- http://www.vsecurity.com/resources/advisory/20101019-1/
- http://www.vupen.com/english/advisories/2011/0298
- https://bugzilla.redhat.com/show_bug.cgi?id=642896
- https://www.exploit-db.com/exploits/44677/