#VU92574 Improper input validation in Linux kernel - CVE-2010-3904
Published: December 6, 2010 / Updated: June 20, 2024
Vulnerability identifier: #VU92574
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2010-3904
CWE-ID: CWE-20
Exploitation vector: Local access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a local user to execute arbitrary code.
The vulnerability exists due to improper input validation error within the rds_page_copy_user() function in net/rds/page.c. A local user can execute arbitrary code.
Remediation
Install update from vendor's repository.
External links
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=799c10559d60f159ab2232203f222f18fa3c4a5f
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
- http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
- http://packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html
- http://secunia.com/advisories/46397
- http://securitytracker.com/id?1024613
- http://www.kb.cert.org/vuls/id/362983
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
- http://www.redhat.com/support/errata/RHSA-2010-0792.html
- http://www.redhat.com/support/errata/RHSA-2010-0842.html
- http://www.securityfocus.com/archive/1/520102/100/0/threaded
- http://www.ubuntu.com/usn/USN-1000-1
- http://www.vmware.com/security/advisories/VMSA-2011-0012.html
- http://www.vsecurity.com/download/tools/linux-rds-exploit.c
- http://www.vsecurity.com/resources/advisory/20101019-1/
- http://www.vupen.com/english/advisories/2011/0298
- https://bugzilla.redhat.com/show_bug.cgi?id=642896
- https://www.exploit-db.com/exploits/44677/