[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2010-1488Date: (C)2010-04-20   (M)2024-02-22


The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.1
Exploit Score: 3.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: PARTIAL
  
Reference:
http://www.openwall.com/lists/oss-security/2010/04/14/1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b95c35e76b29ba812e5dabdd91592e25ec640e93
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.34-rc4
https://bugzilla.redhat.com/show_bug.cgi?id=582068

CPE    146
cpe:/o:linux:linux_kernel:2.6.17
cpe:/o:linux:linux_kernel:2.6.16
cpe:/o:linux:linux_kernel:2.6.15
cpe:/o:linux:linux_kernel:2.6.14
...
CWE    1
CWE-399
OVAL    1
oval:org.secpod.oval:def:700028

© SecPod Technologies