kernel is vulnerable to privilege escalation. A function in the Linux kernel’s Reliable Datagram Sockets (RDS) protocol implementation was missing sanity checks, which could allow a local, unprivileged user to escalate their privileges.
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Technical_Notes/index.html#RHSA-2010:0842
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=799c10559d60f159ab2232203f222f18fa3c4a5f
lists.opensuse.org/opensuse-security-announce/2010-10/msg00008.html
lists.opensuse.org/opensuse-security-announce/2010-11/msg00004.html
lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html
packetstormsecurity.com/files/155751/vReliable-Datagram-Sockets-RDS-rds_page_copy_user-Privilege-Escalation.html
secunia.com/advisories/46397
securitytracker.com/id?1024613
www.kb.cert.org/vuls/id/362983
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0792.html
www.redhat.com/support/errata/RHSA-2010-0842.html
www.securityfocus.com/archive/1/520102/100/0/threaded
www.ubuntu.com/usn/USN-1000-1
www.vmware.com/security/advisories/VMSA-2011-0012.html
www.vsecurity.com/download/tools/linux-rds-exploit.c
www.vsecurity.com/resources/advisory/20101019-1/
www.vupen.com/english/advisories/2011/0298
access.redhat.com/errata/RHSA-2010:0842
bugzilla.redhat.com/show_bug.cgi?id=642896
www.exploit-db.com/exploits/44677/