CVE-2010-3865
Low
Low
Medium
High
Critical
CVSS Score
Vulnerability Description
Integer overflow in the rds_rdma_pages function in net/rds/rdma.c in the Linux kernel allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a crafted iovec struct in a Reliable Datagram Sockets (RDS) request, which triggers a buffer overflow.
Known Affected Software
4 configuration(s) from 2 vendor(s)
opensuse
Version:
11.3
CPE:
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
opensuse
Version:
11.2
CPE:
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
linux_enterprise_real_time
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_real_time:11:sp1:*:*:*:*:*:*
linux_enterprise_high_availability_extension
Version:
11
CPE:
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:-:*:*:*:*:*:*
This vulnerability affects 4 software configuration(s). Ensure you patch all affected systems.
References & Resources
-
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://secunia.com/advisories/42778secalert@redhat.com Third Party Advisory
-
http://secunia.com/advisories/42789secalert@redhat.com Third Party Advisory
-
http://secunia.com/advisories/42801secalert@redhat.com Third Party Advisory
-
http://secunia.com/advisories/42890secalert@redhat.com Third Party Advisory
-
http://secunia.com/advisories/46397secalert@redhat.com Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/10/29/1secalert@redhat.com Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/11/01/1secalert@redhat.com Mailing List Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2011-0004.htmlsecalert@redhat.com Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2011-0007.htmlsecalert@redhat.com Third Party Advisory
-
http://www.securityfocus.com/archive/1/520102/100/0/threadedsecalert@redhat.com Third Party Advisory VDB Entry
-
http://www.securityfocus.com/bid/44549secalert@redhat.com Third Party Advisory VDB Entry
-
http://www.spinics.net/lists/netdev/msg145359.htmlsecalert@redhat.com Mailing List Patch Third Party Advisory
-
http://www.spinics.net/lists/netdev/msg145397.htmlsecalert@redhat.com Mailing List Third Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2011-0012.htmlsecalert@redhat.com Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0012secalert@redhat.com Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0024secalert@redhat.com Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0298secalert@redhat.com Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/62881secalert@redhat.com Third Party Advisory VDB Entry
-
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://secunia.com/advisories/42778af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://secunia.com/advisories/42789af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://secunia.com/advisories/42801af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://secunia.com/advisories/42890af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://secunia.com/advisories/46397af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/10/29/1af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/11/01/1af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2011-0004.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.redhat.com/support/errata/RHSA-2011-0007.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.securityfocus.com/archive/1/520102/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.securityfocus.com/bid/44549af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
-
http://www.spinics.net/lists/netdev/msg145359.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Patch Third Party Advisory
-
http://www.spinics.net/lists/netdev/msg145397.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
http://www.vmware.com/security/advisories/VMSA-2011-0012.htmlaf854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0012af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0024af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
http://www.vupen.com/english/advisories/2011/0298af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/62881af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory VDB Entry
Severity Details
out of 10.0
Low
Weakness Type (CWE)
CWE-190
Top 25 #22
Integer Overflow or Wraparound
- Description
- The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value…
- Exploit Likelihood
- Medium
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- January 11, 2011
