The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
2010-12-30T19:00:04.410
2025-04-11T00:51:21.963
Deferred
CVSSv2: 6.2 (MEDIUM)
AV:L/AC:H/Au:N/C:C/I:C/A:C
1.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | linux | linux_kernel | < 2.6.36.2 | Yes |
Operating System | fedoraproject | fedora | 13 | Yes |
Operating System | opensuse | opensuse | 11.2 | Yes |
Operating System | opensuse | opensuse | 11.3 | Yes |
Operating System | suse | linux_enterprise_desktop | 10 | Yes |
Operating System | suse | linux_enterprise_desktop | 11 | Yes |
Operating System | suse | linux_enterprise_real_time_extension | 11 | Yes |
Operating System | suse | linux_enterprise_server | 9 | Yes |
Operating System | suse | linux_enterprise_server | 10 | Yes |
Operating System | suse | linux_enterprise_server | 11 | Yes |
Operating System | suse | linux_enterprise_software_development_kit | 10 | Yes |