First published: Tue Sep 21 2010(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.36 | |
Linux kernel | =2.6.36 | |
Linux kernel | =2.6.36-rc1 | |
Linux kernel | =2.6.36-rc2 | |
Linux kernel | =2.6.36-rc3 | |
Debian | =5.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =9.04 | |
Ubuntu Linux | =9.10 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =10.10 | |
Linux Kernel | <2.6.36 | |
Linux Kernel | =2.6.36 | |
Linux Kernel | =2.6.36-rc1 | |
Linux Kernel | =2.6.36-rc2 | |
Linux Kernel | =2.6.36-rc3 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =10.04 | |
Ubuntu | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3477 is classified as a local privilege escalation vulnerability.
To fix CVE-2010-3477, upgrade the Linux kernel to version 2.6.36 or later.
CVE-2010-3477 affects the Linux kernel versions prior to 2.6.36.
No, CVE-2010-3477 requires local access to exploit the vulnerability.
The impact of CVE-2010-3477 allows local users to gain unauthorized access to sensitive information.