CVE-2010-4258

Linux Kernel < 2.6.36.2 - Improper Privilege Management

Title source: rule

Description

The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Dan Rosenberg · clocallinux
https://www.exploit-db.com/exploits/15704

References (38)

... and 18 more

Scores

EPSS 0.0586
EPSS Percentile 90.6%

Details

CWE
CWE-269
Status published
Products (11)
fedoraproject/fedora 13
linux/linux_kernel < 2.6.36.2
opensuse/opensuse 11.2
opensuse/opensuse 11.3
suse/linux_enterprise_desktop 10 sp3
suse/linux_enterprise_desktop 11 sp1
suse/linux_enterprise_real_time_extension 11 sp1
suse/linux_enterprise_server 9
suse/linux_enterprise_server 10 sp3
suse/linux_enterprise_server 11 sp1
... and 1 more
Published Dec 30, 2010
Tracked Since Feb 18, 2026