Computer Security
[EN] no-pyccku

Linux kernel RDS protocol privilege escalation
SecurityVulns ID:11211
Threat Level:
Description:It's possible to overwite kernel memory regions via recvmsg() for RDS protocol.
Affected:LINUX : kernel 2.6
CVE:CVE-2010-3904 (The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.)
Original documentdocumentVSR Advisories, VSR Advisories: Linux RDS Protocol Local Privilege Escalation (24.10.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod