Description
The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2094-1 | New Linux 2.6.26 packages fix several issues |
EUVD |
EUVD-2010-2252 | The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server. |
Ubuntu USN |
USN-974-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1074-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T02:25:07.537Z
Reserved: 2010-06-09T00:00:00.000Z
Link: CVE-2010-2240
No data.
Status : Modified
Published: 2010-09-03T20:00:03.560
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-2240
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN