CVE-2010-3865

Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
References
Link Resource
http://www.securityfocus.com/bid/44549 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2010/10/29/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2010/11/01/1 Mailing List Third Party Advisory
http://www.spinics.net/lists/netdev/msg145397.html Mailing List Third Party Advisory
http://www.spinics.net/lists/netdev/msg145359.html Mailing List Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html Mailing List Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0004.html Third Party Advisory
http://secunia.com/advisories/42778 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0012 Third Party Advisory
http://secunia.com/advisories/42801 Third Party Advisory
http://www.vupen.com/english/advisories/2011/0024 Third Party Advisory
http://secunia.com/advisories/42789 Third Party Advisory
http://secunia.com/advisories/42890 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0007.html Third Party Advisory
http://www.vupen.com/english/advisories/2011/0298 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html Mailing List Third Party Advisory
http://secunia.com/advisories/46397 Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2011-0012.html Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/62881 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/520102/100/0/threaded Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*

Information

Published : 2011-01-10 19:00

Updated : 2023-02-12 20:27


NVD link : CVE-2010-3865

Mitre link : CVE-2010-3865


JSON object : View

CWE
CWE-190

Integer Overflow or Wraparound

Advertisement

dedicated server usa

Products Affected

suse

  • linux_enterprise_real_time
  • linux_enterprise_high_availability_extension

opensuse

  • opensuse

linux

  • linux_kernel