CVE-2010-2240

The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.32.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.34.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.35.1:*:*:*:*:*:*:*

History

13 Feb 2023, 04:21

Type Values Removed Values Added
References
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0882', 'name': 'https://access.redhat.com/errata/RHSA-2010:0882', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0660', 'name': 'https://access.redhat.com/errata/RHSA-2010:0660', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0677', 'name': 'https://access.redhat.com/errata/RHSA-2010:0677', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0631', 'name': 'https://access.redhat.com/errata/RHSA-2010:0631', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0670', 'name': 'https://access.redhat.com/errata/RHSA-2010:0670', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2010-2240', 'name': 'https://access.redhat.com/security/cve/CVE-2010-2240', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0676', 'name': 'https://access.redhat.com/errata/RHSA-2010:0676', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2010:0661', 'name': 'https://access.redhat.com/errata/RHSA-2010:0661', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2010-2240 kernel: mm: keep a guard page below a grow-down stack segment The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.

02 Feb 2023, 17:17

Type Values Removed Values Added
Summary The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server. CVE-2010-2240 kernel: mm: keep a guard page below a grow-down stack segment
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=320b2b8de12698082609ebbc1a17165727f4c893', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=320b2b8de12698082609ebbc1a17165727f4c893', 'tags': [], 'refsource': 'CONFIRM'}
  • (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=320b2b8de12698082609ebbc1a17165727f4c893 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0882 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0660 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0677 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0631 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0670 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2010-2240 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0676 -
  • (MISC) https://access.redhat.com/errata/RHSA-2010:0661 -

Information

Published : 2010-09-03 20:00

Updated : 2023-12-10 11:03


NVD link : CVE-2010-2240

Mitre link : CVE-2010-2240

CVE.ORG link : CVE-2010-2240


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')