Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-3081

Опубликовано: 24 сент. 2010
Источник: ubuntu
Приоритет: high
EPSS Средний
CVSS2: 7.2
CVSS3: 7.8

Описание

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

2.6.24-28.79
jaunty

released

2.6.28-19.65
karmic

released

2.6.31-22.65
lucid

released

2.6.32-24.43
maverick

released

2.6.35-22.32
upstream

released

2.6.36~rc5

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

DNE

karmic

released

2.6.31-112.30
lucid

released

2.6.31-608.22
maverick

DNE

upstream

released

2.6.36~rc5

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-55.88
devel

DNE

hardy

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

upstream

released

2.6.36~rc5

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

DNE

karmic

DNE

lucid

DNE

maverick

released

2.6.35-903.22
upstream

released

2.6.36~rc5

Показывать по

EPSS

Процентиль: 94%
0.14754
Средний

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

redhat
почти 15 лет назад

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

CVSS3: 7.8
nvd
больше 14 лет назад

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

CVSS3: 7.8
debian
больше 14 лет назад

The compat_alloc_user_space functions in include/asm/compat.h files in ...

CVSS3: 7.8
github
около 3 лет назад

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

oracle-oval
почти 15 лет назад

ELSA-2010-0704: kernel security update (IMPORTANT)

EPSS

Процентиль: 94%
0.14754
Средний

7.2 High

CVSS2

7.8 High

CVSS3

Уязвимость CVE-2010-3081