Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2010-4243
Description:fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858.
Test IDs: 1.3.6.1.4.1.25623.1.0.68717   1.3.6.1.4.1.25623.1.0.71918   1.3.6.1.4.1.25623.1.0.68992  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2010-4243
15619
http://www.exploit-db.com/exploits/15619
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
42884
http://secunia.com/advisories/42884
45004
http://www.securityfocus.com/bid/45004
46397
http://secunia.com/advisories/46397
RHSA-2011:0017
http://www.redhat.com/support/errata/RHSA-2011-0017.html
[linux-kernel] 20100827 [PATCH] exec argument expansion can inappropriately trigger OOM-killer
http://lkml.org/lkml/2010/8/27/429
[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer
http://lkml.org/lkml/2010/8/29/206
[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer
http://lkml.org/lkml/2010/8/30/138
[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer
http://lkml.org/lkml/2010/8/30/378
[linux-kernel] 20101130 [PATCH 1/2] exec: make argv/envp memory visible to oom-killer
http://linux.derkeiler.com/Mailing-Lists/Kernel/2010-11/msg13278.html
[oss-security] 20101122 CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
http://openwall.com/lists/oss-security/2010/11/22/6
[oss-security] 20101122 Re: CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
http://openwall.com/lists/oss-security/2010/11/22/15
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c
http://grsecurity.net/~spender/64bit_dos.c
http://grsecurity.net/~spender/64bit_dos.c
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=625688
https://bugzilla.redhat.com/show_bug.cgi?id=625688
linux-kernel-execve-dos(64700)
https://exchange.xforce.ibmcloud.com/vulnerabilities/64700




© 1998-2025 E-Soft Inc. All rights reserved.