Red Hat Customer Portal

Skip to main content

CVE-2010-3858

Impact:
Moderate
Public Date:
2010-08-13
IAVA:
2011-A-0147
Bugzilla:
645222: CVE-2010-3858 kernel: setup_arg_pages: diagnose excessive argument size

The MITRE CVE dictionary describes this issue as:

The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.

Find out more about CVE-2010-3858 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of Linux kernel as shipped with Red Hat
Enterprise Linux 4 as they did not backport the upstream commit b6a2fea3 that introduced the issue. This was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html and
https://rhn.redhat.com/errata/RHSA-2010-0958.html. Future kernel updates in Red Hat Enterprise Linux 6 may address this flaw.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 4.9
Base Metrics AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0958 2010-12-08
Red Hat Enterprise Linux 6 (kernel) RHSA-2011:0836 2011-06-01
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:0004 2011-01-04

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 1.3 realtime-kernel Affected

Acknowledgements

Red Hat would like to thank Brad Spengler for reporting this issue.

Last Modified