We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
Reserved 2010-11-16 | Published 2010-12-30 | Updated 2024-08-07 | Assigner redhatopenwall.com/lists/oss-security/2010/12/02/2 ([oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path)
secunia.com/advisories/43056 (43056)
lists.opensuse.org/...ecurity-announce/2011-01/msg00004.html (SUSE-SA:2011:004)
secunia.com/advisories/42778 (42778)
openwall.com/lists/oss-security/2010/12/02/3 ([oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
git.kernel.org/...h=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177
secunia.com/advisories/42801 (42801)
lists.opensuse.org/...ecurity-announce/2011-01/msg00001.html (SUSE-SA:2011:002)
blog.nelhage.com/2010/12/cve-2010-4258-from-dos-to-privesc/
openwall.com/lists/oss-security/2010/12/09/4 ([oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
lists.fedoraproject.org/...nnounce/2010-December/052513.html (FEDORA-2010-18983)
lists.opensuse.org/...ecurity-announce/2011-01/msg00000.html (SUSE-SA:2011:001)
secunia.com/advisories/42932 (42932)
archives.neohapsis.com/...s/fulldisclosure/2010-12/0086.html (20101207 Linux kernel exploit)
www.vupen.com/english/advisories/2011/0124 (ADV-2011-0124)
marc.info/?l=linux-kernel&m=129117048916957&w=2 ([linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.)
lists.opensuse.org/...ecurity-announce/2011-02/msg00000.html (SUSE-SA:2011:007)
www.vupen.com/english/advisories/2010/3321 (ADV-2010-3321)
openwall.com/lists/oss-security/2010/12/08/9 ([oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
www.vupen.com/english/advisories/2011/0298 (ADV-2011-0298)
www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36.2
openwall.com/lists/oss-security/2010/12/09/14 ([oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
lists.opensuse.org/...ecurity-announce/2011-01/msg00007.html (SUSE-SA:2011:005)
code.google.com/p/chromium-os/issues/detail?id=10234
www.vupen.com/english/advisories/2011/0375 (ADV-2011-0375)
lkml.org/lkml/2010/12/1/543 ([linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.)
googlechromereleases.blogspot.com/...eta-channel-update.html
www.vupen.com/english/advisories/2011/0012 (ADV-2011-0012)
lists.opensuse.org/...ecurity-announce/2011-02/msg00002.html (SUSE-SA:2011:008)
openwall.com/lists/oss-security/2010/12/02/4 ([oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
www.mandriva.com/security/advisories?name=MDVSA-2011:029 (MDVSA-2011:029)
secunia.com/advisories/42745 (42745)
openwall.com/lists/oss-security/2010/12/02/7 ([oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path)
openwall.com/lists/oss-security/2010/12/08/5 ([oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
secunia.com/advisories/43291 (43291)
www.vupen.com/english/advisories/2011/0213 (ADV-2011-0213)
bugzilla.redhat.com/show_bug.cgi?id=659567
openwall.com/lists/oss-security/2010/12/08/4 ([oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses)
Support options