{
  "threat_severity" : "Important",
  "public_date" : "2010-09-15T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: 64-bit Compatibility Mode Stack Pointer Underflow",
    "id" : "634457",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=634457"
  },
  "cvss" : {
    "cvss_base_score" : "7.2",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
    "status" : "verified"
  },
  "cwe" : "CWE-190->CWE-119",
  "details" : [ "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010." ],
  "statement" : "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.",
  "acknowledgement" : "Red Hat would like to thank Ben Hawkes for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "MRG for RHEL-5",
    "release_date" : "2010-10-08T00:00:00Z",
    "advisory" : "RHSA-2010:0758",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:1::el5",
    "package" : "kernel-rt-0:2.6.24.7-169.el5rt"
  }, {
    "product_name" : "Red Hat Enterprise Linux 3 Extended Lifecycle Support",
    "release_date" : "2010-11-12T00:00:00Z",
    "advisory" : "RHSA-2010:0882",
    "cpe" : "cpe:/o:redhat:rhel_els:3",
    "package" : "kernel-0:2.4.21-66.EL"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2010-09-28T00:00:00Z",
    "advisory" : "RHSA-2010:0718",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "kernel-0:2.6.9-89.29.1.EL"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4.7 Z Stream",
    "release_date" : "2010-09-28T00:00:00Z",
    "advisory" : "RHSA-2010:0719",
    "cpe" : "cpe:/o:redhat:rhel_eus:4.7",
    "package" : "kernel-0:2.6.9-78.0.33.EL"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2010-09-21T00:00:00Z",
    "advisory" : "RHSA-2010:0704",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-194.11.4.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.3.Z - Server Only",
    "release_date" : "2010-09-22T00:00:00Z",
    "advisory" : "RHSA-2010:0711",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.3",
    "package" : "kernel-0:2.6.18-128.23.2.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.4.Z - Server Only",
    "release_date" : "2010-09-21T00:00:00Z",
    "advisory" : "RHSA-2010:0705",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.4",
    "package" : "kernel-0:2.6.18-164.25.2.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2010-11-10T00:00:00Z",
    "advisory" : "RHSA-2010:0842",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-71.7.1.el6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2010-3081\nhttps://nvd.nist.gov/vuln/detail/CVE-2010-3081" ],
  "name" : "CVE-2010-3081",
  "csaw" : false
}