6.2

CVE-2010-4258

The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 2.6.36.2
FedoraprojectFedora Version13
OpensuseOpensuse Version11.2
OpensuseOpensuse Version11.3
SuseLinux Enterprise Desktop Version10 Updatesp3
SuseLinux Enterprise Desktop Version11 Updatesp1
SuseLinux Enterprise Real Time Extension Version11 Updatesp1
SuseLinux Enterprise Server Version10 Updatesp3
SuseLinux Enterprise Server Version11 Updatesp1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.52% 0.848
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.2 1.9 10
AV:L/AC:H/Au:N/C:C/I:C/A:C
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

http://openwall.com/lists/oss-security/2010/12/02/2
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/02/3
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/02/4
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/02/7
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/08/4
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/08/5
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/08/9
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/09/14
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2010/12/09/4
Third Party Advisory
Mailing List
https://bugzilla.redhat.com/show_bug.cgi?id=659567
Third Party Advisory
Issue Tracking
https://lkml.org/lkml/2010/12/1/543
Patch
Third Party Advisory
Mailing List