Executive Summary

Informations
Name CVE-2010-1488 First vendor Publication 2010-04-20
Vendor Cve Last vendor Modification 2023-11-07

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score 2.1 Attack Range Local
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1488

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13167
 
Oval ID: oval:org.mitre.oval:def:13167
Title: USN-947-2 -- linux regression
Description: USN-947-1 fixed vulnerabilities in the Linux kernel. Fixes for CVE-2010-0419 caused failures when using KVM in certain situations. This update reverts that fix until a better solution can be found. We apologize for the inconvenience. Original advisory details: It was discovered that the Linux kernel did not correctly handle memory protection of the Virtual Dynamic Shared Object page when running a 32-bit application on a 64-bit kernel. A local attacker could exploit this to cause a denial of service. It was discovered that the r8169 network driver did not correctly check the size of Ethernet frames. A remote attacker could send specially crafted traffic to crash the system, leading to a denial of service. Wei Yongjun discovered that SCTP did not correctly validate certain chunks. A remote attacker could send specially crafted traffic to monopolize CPU resources, leading to a denial of service. It was discovered that KVM did not correctly limit certain privileged IO accesses on x86. Processes in the guest OS with access to IO regions could gain further privileges within the guest OS. Evgeniy Polyakov discovered that IPv6 did not correctly handle certain TUN packets. A remote attacker could exploit this to crash the system, leading to a denial of service. Sachin Prabhu discovered that GFS2 did not correctly handle certain locks. A local attacker with write access to a GFS2 filesystem could exploit this to crash the system, leading to a denial of service. Jamie Strandboge discovered that network virtio in KVM did not correctly handle certain high-traffic conditions. A remote attacker could exploit this by sending specially crafted traffic to a guest OS, causing the guest to crash, leading to a denial of service. Marcus Meissner discovered that the USB subsystem did not correctly handle certain error conditions. A local attacker with access to a USB device could exploit this to read recently used kernel memory, leading to a loss of privacy and potentially root privilege escalation. Neil Brown discovered that the Bluetooth subsystem did not correctly handle large amounts of traffic. A physically proximate remote attacker could exploit this by sending specially crafted traffic that would consume all available system memory, leading to a denial of service. Jody Bruchon discovered that the sound driver for the AMD780V did not correctly handle certain conditions. A local attacker with access to this hardward could exploit the flaw to cause a system crash, leading to a denial of service. Ang Way Chuang discovered that the DVB driver did not correctly handle certain MPEG2-TS frames. An attacker could exploit this by delivering specially crafted frames to monopolize CPU resources, leading to a denial of service. Trond Myklebust discovered that NFS did not correctly handle truncation under certain conditions. A local attacker with write access to an NFS share could exploit this to crash the system, leading to a denial of service. Al Viro discovered that automount of NFS did not correctly handle symlinks under certain conditions. A local attacker could exploit this to crash the system, leading to a denial of service. Matt McCutchen discovered that ReiserFS did not correctly protect xattr files in the .reiserfs_priv directory. A local attacker could exploit this to gain root privileges or crash the system, leading to a denial of service. Eugene Teo discovered that CIFS did not correctly validate arguments when creating new files. A local attacker could exploit this to crash the system, leading to a denial of service, or possibly gain root privileges if mmap_min_addr was not set. Catalin Marinas and Tetsuo Handa discovered that the TTY layer did not correctly release process IDs. A local attacker could exploit this to consume kernel resources, leading to a denial of service. Neil Horman discovered that TIPC did not correctly check its internal state. A local attacker could send specially crafted packets via AF_TIPC that would cause the system to crash, leading to a denial of service. Masayuki Nakagawa discovered that IPv6 did not correctly handle certain settings when listening. If a socket were listening with the IPV6_RECVPKTINFO flag, a remote attacker could send specially crafted traffic that would cause the system to crash, leading to a denial of service. Oleg Nesterov discovered that the Out-Of-Memory handler did not correctly handle certain arrangements of processes. A local attacker could exploit this to crash the system, leading to a denial of service
Family: unix Class: patch
Reference(s): USN-947-2
CVE-2010-0419
CVE-2009-4271
CVE-2009-4537
CVE-2010-0008
CVE-2010-0298
CVE-2010-0306
CVE-2010-0437
CVE-2010-0727
CVE-2010-0741
CVE-2010-1083
CVE-2010-1084
CVE-2010-1085
CVE-2010-1086
CVE-2010-1087
CVE-2010-1088
CVE-2010-1146
CVE-2010-1148
CVE-2010-1162
CVE-2010-1187
CVE-2010-1188
CVE-2010-1488
Version: 5
Platform(s): Ubuntu 10.04
Product(s): linux
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1307

OpenVAS Exploits

Date Description
2010-06-07 Name : Ubuntu Update for Linux kernel vulnerabilities USN-947-1
File : nvt/gb_ubuntu_USN_947_1.nasl
2010-06-07 Name : Ubuntu Update for linux regression USN-947-2
File : nvt/gb_ubuntu_USN_947_2.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
63965 Linux Kernel fs/proc/base.c proc_oom_score Function Task Creation OOM Killer ...

Nessus® Vulnerability Scanner

Date Description
2010-06-04 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-947-1.nasl - Type : ACT_GATHER_INFO
2010-06-04 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-947-2.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3...
Source Url
CONFIRM http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.34-rc4
https://bugzilla.redhat.com/show_bug.cgi?id=582068
MLIST http://www.openwall.com/lists/oss-security/2010/04/14/1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
Date Informations
2024-02-02 01:13:10
  • Multiple Updates
2024-02-01 12:03:36
  • Multiple Updates
2023-11-07 21:47:36
  • Multiple Updates
2023-09-05 12:12:16
  • Multiple Updates
2023-09-05 01:03:27
  • Multiple Updates
2023-09-02 12:12:19
  • Multiple Updates
2023-09-02 01:03:29
  • Multiple Updates
2023-08-12 12:14:37
  • Multiple Updates
2023-08-12 01:03:29
  • Multiple Updates
2023-08-11 12:12:22
  • Multiple Updates
2023-08-11 01:03:37
  • Multiple Updates
2023-08-06 12:11:54
  • Multiple Updates
2023-08-06 01:03:31
  • Multiple Updates
2023-08-04 12:11:59
  • Multiple Updates
2023-08-04 01:03:32
  • Multiple Updates
2023-07-14 12:11:55
  • Multiple Updates
2023-07-14 01:03:30
  • Multiple Updates
2023-03-29 01:13:38
  • Multiple Updates
2023-03-28 12:03:36
  • Multiple Updates
2022-10-11 12:10:38
  • Multiple Updates
2022-10-11 01:03:18
  • Multiple Updates
2022-03-11 01:08:51
  • Multiple Updates
2021-05-04 12:11:33
  • Multiple Updates
2021-04-22 01:12:04
  • Multiple Updates
2020-08-11 12:05:03
  • Multiple Updates
2020-08-08 01:05:06
  • Multiple Updates
2020-08-07 12:05:10
  • Multiple Updates
2020-08-01 12:05:08
  • Multiple Updates
2020-07-30 01:05:17
  • Multiple Updates
2020-05-23 01:41:59
  • Multiple Updates
2020-05-23 00:25:40
  • Multiple Updates
2019-01-25 12:03:08
  • Multiple Updates
2018-11-17 12:01:39
  • Multiple Updates
2018-10-30 12:03:21
  • Multiple Updates
2016-07-01 11:06:48
  • Multiple Updates
2016-06-29 00:12:31
  • Multiple Updates
2016-06-28 18:08:28
  • Multiple Updates
2016-04-26 19:45:19
  • Multiple Updates
2014-02-17 10:54:58
  • Multiple Updates
2013-05-10 23:23:15
  • Multiple Updates