CVE-2010-2240
Publication date 17 August 2010
Last updated 24 July 2024
Ubuntu priority
The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
From the Ubuntu Security Team
Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory manager did not properly handle when applications grow stacks into adjacent memory regions. A local attacker could exploit this to gain control of certain applications, potentially leading to privilege escalation, as demonstrated in attacks against the X server.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-mvl-dove | ||
linux-source-2.6.15 | ||
Notes
Patch details
References
Related Ubuntu Security Notices (USN)
- USN-974-1
- Linux kernel vulnerabilities
- 19 August 2010
- USN-1074-1
- Linux kernel vulnerabilities
- 25 February 2011