First published: Thu Oct 14 2010(Updated: )
Description of problem: The handling functions for sending and receiving messages, in rds_page_copy_user(), use the unchecked __copy_*_user_inatomic functions without any access checks on user-provided pointers. As a result, by passing a kernel address as an iovec base address in recvmsg-style calls, a local user can overwrite arbitrary kernel memory, which can easily be used to escalate privileges to root. Introduced via 7875e18e (v2.6.30-rc1). Acknowledgements: Red Hat would like to thank Dan Rosenberg of Virtual Security Research for reporting this issue.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Linux kernel | <2.6.36 | |
SUSE Linux Enterprise Desktop | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
openSUSE openSUSE | =11.2 | |
openSUSE openSUSE | =11.3 | |
Suse Linux Enterprise Real Time Extension | =11-sp1 | |
Canonical Ubuntu Linux | =10.10 | |
Canonical Ubuntu Linux | =9.04 | |
Canonical Ubuntu Linux | =9.10 | |
Canonical Ubuntu Linux | =8.04 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =6.06 | |
Linux kernel | ||
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
VMware ESXi | =3.5 | |
VMware ESXi | =4.0 | |
VMware ESXi | =4.1 | |
VMware ESXi | =5.0 |
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.