CVE-2010-4258
Publication date 30 December 2010
Last updated 24 July 2024
Ubuntu priority
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
From the Ubuntu Security Team
Nelson Elhage discovered that the kernel did not correctly handle process cleanup after triggering a recoverable kernel bug. If a local attacker were able to trigger certain kinds of kernel bugs, they could create a specially crafted process to gain root privileges.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
linux-ti-omap4 | ||
Patch details
Package | Patch details |
---|---|
linux |
References
Related Ubuntu Security Notices (USN)
- USN-1164-1
- Linux kernel vulnerabilities (i.MX51)
- 6 July 2011
- USN-1105-1
- Linux kernel vulnerabilities
- 5 April 2011
- USN-1083-1
- Linux kernel vulnerabilities
- 3 March 2011
- USN-1054-1
- Linux kernel vulnerabilities
- 1 February 2011
- USN-1111-1
- Linux kernel vulnerabilities
- 5 May 2011
- USN-1119-1
- Linux kernel (OMAP4) vulnerabilities
- 20 April 2011
- USN-1093-1
- Linux Kernel vulnerabilities (Marvell Dove)
- 25 March 2011