Computer Security
[EN] securityvulns.ru no-pyccku


Linux kernel RDS protocol privilege escalation
Published:24.10.2010
Source:
SecurityVulns ID:11211
Type:local
Threat Level:
6/10
Description:It's possible to overwite kernel memory regions via recvmsg() for RDS protocol.
Affected:LINUX : kernel 2.6
CVE:CVE-2010-3904 (The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.)
Original documentdocumentVSR Advisories, VSR Advisories: Linux RDS Protocol Local Privilege Escalation (24.10.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod