CVE Database

CVE-2010-3858

Impact: Moderate
Public: 2010-08-13
Bugzilla: 645222: CVE-2010-3858 kernel: setup_arg_pages: diagnose excessive argument size
IAVA: 2011-A-0147

Details

The MITRE CVE dictionary describes this issue as:

The setup_arg_pages function in fs/exec.c in the Linux kernel before 2.6.36, when CONFIG_STACK_GROWSDOWN is used, does not properly restrict the stack memory consumption of the (1) arguments and (2) environment for a 32-bit application on a 64-bit platform, which allows local users to cause a denial of service (system crash) via a crafted exec system call, a related issue to CVE-2010-2240.

Find out more about CVE-2010-3858 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue did not affect the versions of Linux kernel as shipped with Red Hat
Enterprise Linux 4 as they did not backport the upstream commit b6a2fea3 that introduced the issue. This was addressed in Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html and
https://rhn.redhat.com/errata/RHSA-2010-0958.html. Future kernel updates in Red Hat Enterprise Linux 6 may address this flaw.

CVSS v2 metrics

Base Score: 4.9
Base Metrics: AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector: Local
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0958 December 08, 2010
Red Hat Enterprise Linux version 5 (kernel) RHSA-2011:0004 January 04, 2011
Red Hat Enterprise Linux version 6 (kernel) RHSA-2011:0836 June 01, 2011

External References

Acknowledgements

Red Hat would like to thank Brad Spengler for reporting this issue.

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.