CVE-2010-4258
Linux Kernel < 2.6.36.2 - Improper Privilege Management
Title source: ruleDescription
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Dan Rosenberg · clocallinux
https://www.exploit-db.com/exploits/15704
References (38)
... and 18 more
Scores
EPSS
0.0586
EPSS Percentile
90.6%
Details
CWE
CWE-269
Status
published
Products (11)
fedoraproject/fedora
13
linux/linux_kernel
< 2.6.36.2
opensuse/opensuse
11.2
opensuse/opensuse
11.3
suse/linux_enterprise_desktop
10 sp3
suse/linux_enterprise_desktop
11 sp1
suse/linux_enterprise_real_time_extension
11 sp1
suse/linux_enterprise_server
9
suse/linux_enterprise_server
10 sp3
suse/linux_enterprise_server
11 sp1
... and 1 more
Published
Dec 30, 2010
Tracked Since
Feb 18, 2026