CVE-2010-3081

The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
linuxlinux_kernel
𝑥
≤ 2.6.35.4
linuxlinux_kernel
2.6.36
linuxlinux_kernel
2.6.36:rc1
linuxlinux_kernel
2.6.36:rc2
linuxlinux_kernel
2.6.36:rc3
vmwareesx
4.0
vmwareesx
4.1
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
linux
maverick
Fixed 2.6.35-22.32
released
lucid
Fixed 2.6.32-24.43
released
karmic
Fixed 2.6.31-22.65
released
jaunty
Fixed 2.6.28-19.65
released
hardy
Fixed 2.6.24-28.79
released
dapper
dne
linux-fsl-imx51
maverick
dne
lucid
Fixed 2.6.31-608.22
released
karmic
Fixed 2.6.31-112.30
released
hardy
dne
dapper
dne
linux-source-2.6.15
maverick
dne
lucid
dne
karmic
dne
jaunty
dne
hardy
dne
dapper
Fixed 2.6.15-55.88
released
linux-ti-omap4
maverick
Fixed 2.6.35-903.22
released
lucid
dne
karmic
dne
hardy
dne
dapper
dne
References