CVE-2010-4258

Published Dec 30, 2010

Last updated 2 years ago

Overview

Description
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
Source
secalert@redhat.com
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
6.2
Impact score
10
Exploitability score
1.9
Vector string
AV:L/AC:H/Au:N/C:C/I:C/A:C

Weaknesses

nvd@nist.gov
CWE-269

Configurations

References