← Zuruck zu CVEs
CVE-2010-4243
N/ABeschreibung
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht1/22/2011
Zuletzt geandert4/29/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
linux:linux_kernel
Schwachen (CWE)
CWE-400
Referenzen
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c(secalert@redhat.com)
http://grsecurity.net/~spender/64bit_dos.c(secalert@redhat.com)
http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html(secalert@redhat.com)
http://lkml.org/lkml/2010/8/27/429(secalert@redhat.com)
http://lkml.org/lkml/2010/8/29/206(secalert@redhat.com)
http://lkml.org/lkml/2010/8/30/138(secalert@redhat.com)
http://lkml.org/lkml/2010/8/30/378(secalert@redhat.com)
http://openwall.com/lists/oss-security/2010/11/22/15(secalert@redhat.com)
http://openwall.com/lists/oss-security/2010/11/22/6(secalert@redhat.com)
http://secunia.com/advisories/42884(secalert@redhat.com)
http://secunia.com/advisories/46397(secalert@redhat.com)
http://www.exploit-db.com/exploits/15619(secalert@redhat.com)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2011-0017.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/520102/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/45004(secalert@redhat.com)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=625688(secalert@redhat.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64700(secalert@redhat.com)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c(af854a3a-2127-422b-91ae-364da2661108)
http://grsecurity.net/~spender/64bit_dos.c(af854a3a-2127-422b-91ae-364da2661108)
http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html(af854a3a-2127-422b-91ae-364da2661108)
http://lkml.org/lkml/2010/8/27/429(af854a3a-2127-422b-91ae-364da2661108)
http://lkml.org/lkml/2010/8/29/206(af854a3a-2127-422b-91ae-364da2661108)
http://lkml.org/lkml/2010/8/30/138(af854a3a-2127-422b-91ae-364da2661108)
http://lkml.org/lkml/2010/8/30/378(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2010/11/22/15(af854a3a-2127-422b-91ae-364da2661108)
http://openwall.com/lists/oss-security/2010/11/22/6(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/42884(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/46397(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/15619(af854a3a-2127-422b-91ae-364da2661108)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2011-0017.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/520102/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/45004(af854a3a-2127-422b-91ae-364da2661108)
http://www.vmware.com/security/advisories/VMSA-2011-0012.html(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=625688(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64700(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.