Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2010-4258 — Improper Privilege Management in Kernel
Severity
6.2MEDIUMNVD
EPSS
5.9%
top 9.43%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 30
Latest updateMay 13
Description
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
CVSS vector
AV:L/AC:H/C:C/I:C/A:CExploitability: 1.9 | Impact: 10.0
Affected Packages6 packages
Also affects: Fedora 13
Patches
🔴Vulnerability Details
2💥Exploits & PoCs
1Exploit-DB
▶
📋Vendor Advisories
8💬Community
4Bugzilla▶
CVE-2010-4258 kernel: failure to revert address limit override in OOPS error path [mrg-1.3]↗2010-12-03
Bugzilla
▶
Bugzilla▶
CVE-2010-4258 kernel: failure to revert address limit override in OOPS error path [rhel-5.6]↗2010-12-03
Bugzilla▶
CVE-2010-4258 kernel: failure to revert address limit override in OOPS error path [rhel-4.8.z]↗2010-12-03