We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | redhat |
Reserved | 2010-11-16 |
Published | 2010-12-30 |
Updated | 2024-08-07 |
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
http://openwall.com/lists/oss-security/2010/12/02/2 ([oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path)
http://secunia.com/advisories/43056 (43056)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00004.html (SUSE-SA:2011:004)
http://secunia.com/advisories/42778 (42778)
http://openwall.com/lists/oss-security/2010/12/02/3 ([oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
http://secunia.com/advisories/42801 (42801)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00001.html (SUSE-SA:2011:002)
http://blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/
http://openwall.com/lists/oss-security/2010/12/09/4 ([oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html (FEDORA-2010-18983)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html (SUSE-SA:2011:001)
http://secunia.com/advisories/42932 (42932)
http://archives.neohapsis.com/archives/fulldisclosure/2010-12/0086.html (20101207 Linux kernel exploit)
http://www.vupen.com/english/advisories/2011/0124 (ADV-2011-0124)
http://marc.info/?l=linux-kernel&m=129117048916957&w=2 ([linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html (SUSE-SA:2011:007)
http://www.vupen.com/english/advisories/2010/3321 (ADV-2010-3321)
http://openwall.com/lists/oss-security/2010/12/08/9 ([oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
http://www.vupen.com/english/advisories/2011/0298 (ADV-2011-0298)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
http://openwall.com/lists/oss-security/2010/12/09/14 ([oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00007.html (SUSE-SA:2011:005)
http://code.google.com/p/chromium-os/issues/detail?id=10234
http://www.vupen.com/english/advisories/2011/0375 (ADV-2011-0375)
https://lkml.org/lkml/2010/12/1/543 ([linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.)
http://googlechromereleases.blogspot.com/2011/01/chrome-os-beta-channel-update.html
http://www.vupen.com/english/advisories/2011/0012 (ADV-2011-0012)
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html (SUSE-SA:2011:008)
http://openwall.com/lists/oss-security/2010/12/02/4 ([oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 (MDVSA-2011:029)
http://secunia.com/advisories/42745 (42745)
http://openwall.com/lists/oss-security/2010/12/02/7 ([oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path)
http://openwall.com/lists/oss-security/2010/12/08/5 ([oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
http://secunia.com/advisories/43291 (43291)
http://www.vupen.com/english/advisories/2011/0213 (ADV-2011-0213)
https://bugzilla.redhat.com/show_bug.cgi?id=659567
http://openwall.com/lists/oss-security/2010/12/08/4 ([oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)