Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2010-4258

Disclosure Date: December 30, 2010
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • fedoraproject,
  • linux,
  • opensuse,
  • suse

Products

  • fedora 13,
  • linux enterprise desktop 10,
  • linux enterprise desktop 11,
  • linux enterprise real time extension 11,
  • linux enterprise server 10,
  • linux enterprise server 11,
  • linux enterprise server 9,
  • linux enterprise software development kit 10,
  • linux kernel,
  • opensuse 11.2,
  • opensuse 11.3

References

Advisory

Additional Info

Technical Analysis