Total vulnerabilities in the database
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | - | 2.6.36.2 |
fedoraproject / fedora | 13 | 13.x |
suse / linux_enterprise_server | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_desktop | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_server | 11-sp1 | 11-sp1.x |
suse / linux_enterprise_server | 9 | 9.x |
opensuse / opensuse | 11.2 | 11.2.x |
opensuse / opensuse | 11.3 | 11.3.x |
suse / linux_enterprise_desktop | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_software_development_kit | 10-sp3 | 10-sp3.x |
suse / linux_enterprise_real_time_extension | 11-sp1 | 11-sp1.x |