Skip to navigation

CVE Database

CVE-2010-2240

Impact: Important
Public: 2010-08-13
CWE: CWE-119
Bugzilla: 606611: CVE-2010-2240 kernel: mm: keep a guard page below a grow-down stack segment
IAVA: 2011-A-0066

Details

The MITRE CVE dictionary describes this issue as:

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

Find out more about CVE-2010-2240 from the MITRE CVE dictionary and NIST NVD.

CVSS v2 metrics

Base Score: 7.2
Base Metrics: AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0631 August 17, 2010
Red Hat Enterprise Linux ES (v. 3 ELS) (kernel) RHSA-2010:0882 November 12, 2010
Red Hat Enterprise Linux ES EUS (v. 4.7) (kernel) RHSA-2010:0677 September 07, 2010
Red Hat Enterprise Linux EUS (v. 5.3 server) (kernel) RHSA-2010:0660 August 30, 2010
Red Hat Enterprise Linux EUS (v. 5.4 server) (kernel) RHSA-2010:0670 September 02, 2010
Red Hat Enterprise Linux version 4 (kernel) RHSA-2010:0676 September 07, 2010
Red Hat Enterprise Linux version 5 (kernel) RHSA-2010:0661 August 30, 2010

External References

Acknowledgements

Red Hat would like to thank the X.Org security team for reporting this issue. Upstream acknowledges Rafal Wojtczuk as the original reporter.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.