The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.

Project Subscriptions

Vendors Products
Linux Kernel Subscribe
Enterprise Linux Subscribe
Enterprise Mrg Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Suse Linux Enterprise Desktop Subscribe
Suse Linux Enterprise Server Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2110-1 New Linux 2.6.26 packages fix several issues
Ubuntu USN Ubuntu USN USN-988-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1074-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1074-2 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1119-1 Linux kernel (OMAP4) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html cve-icon cve-icon
http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html cve-icon cve-icon
http://blog.ksplice.com/2010/09/cve-2010-3081/ cve-icon cve-icon
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6 cve-icon cve-icon
http://isc.sans.edu/diary.html?storyid=9574 cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html cve-icon cve-icon
http://marc.info/?l=oss-security&m=128461522230211&w=2 cve-icon cve-icon
http://secunia.com/advisories/42384 cve-icon cve-icon
http://secunia.com/advisories/43315 cve-icon cve-icon
http://sota.gen.nz/compat1/ cve-icon cve-icon
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:198 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:214 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:247 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0758.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0842.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0882.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/514938/30/30/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/516397/100/0/threaded cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2010-0017.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2011-0003.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3083 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3117 cve-icon cve-icon
http://www.vupen.com/english/advisories/2011/0298 cve-icon cve-icon
https://access.redhat.com/kb/docs/DOC-40265 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=634457 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-3081 cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-3081 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T02:55:46.715Z

Reserved: 2010-08-20T00:00:00

Link: CVE-2010-3081

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-09-24T20:00:02.183

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-3081

cve-icon Redhat

Severity : Important

Publid Date: 2010-09-15T00:00:00Z

Links: CVE-2010-3081 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses