First published: Thu Oct 28 2010(Updated: )
Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <=2.6.36 | |
openSUSE | =11.2 | |
openSUSE | =11.3 | |
SUSE Linux Enterprise High Availability | =11-sp1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3865 has a high severity due to its potential to cause denial of service and arbitrary code execution.
To mitigate CVE-2010-3865, update the Linux kernel to a version later than 2.6.36 or apply relevant security patches.
CVE-2010-3865 affects various Linux distributions, particularly those using kernel versions up to 2.6.36.
CVE-2010-3865 is not remotely exploitable; it requires local user access to exploit the vulnerability.
CVE-2010-3865 can lead to denial of service attacks by crashing the system and may allow for arbitrary code execution.