Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 18 Nov 2010 09:39:12 +0800
From: Eugene Teo <>
CC: Dan Rosenberg <>
Subject: Re: CVE request: kernel: integer overflow in RDS

On 11/18/2010 12:58 AM, Dan Rosenberg wrote:
> In rds_cmsg_rdma_args(), the user-provided args->nr_local value is
> restricted to less than UINT_MAX.  This needs a tighter upper bound,
> since the calculation of total iov_size can overflow, resulting in a
> small sock_kmalloc() allocation.  This would probably just result in
> walking off the heap and crashing when calling rds_rdma_pages() with a
> high count value.  If it somehow doesn't crash here, then memory
> corruption could occur soon after.
> This is closely related to CVE-2010-3865
> (, which also
> concerned various integer overflow and memory corruption issues in
> rds_cmsg_rdma_args().  In fact, I'd say it's due to an incomplete fix.
> Reference:

Please use CVE-2010-4175. Thanks.

main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ