First published: Fri Aug 20 2010(Updated: )
Description of problem: This issue was mentioned in <a href="http://grsecurity.net/~spender/64bit_dos.c">http://grsecurity.net/~spender/64bit_dos.c</a>. Written in the comments: "The second bug here is that the memory usage explodes within the kernel from a single 128k allocation in userland The explosion of memory isn't accounted for by any task so it won't be terminated by the OOM killer." Acknowledgements: Red Hat would like to thank Brad Spengler for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <2.6.37 | |
debian/linux-2.6 | ||
debian/user-mode-linux | ||
Linux Kernel | <2.6.37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4243 has been classified as a medium severity vulnerability that can lead to excessive memory consumption in the kernel.
To fix CVE-2010-4243, users should upgrade to a kernel version later than 2.6.37 where the vulnerability has been addressed.
CVE-2010-4243 affects the Linux kernel versions up to and including 2.6.37 as well as the user-mode-linux package.
CVE-2010-4243 is a memory allocation vulnerability that can cause memory usage to increase significantly within the Linux kernel.
CVE-2010-4243 does not indicate remote exploitation capabilities and is primarily a local privilege escalation issue.