Your submission was sent successfully! Close

CVE-2010-1488

Published: 20 April 2010

The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy
Released (2.6.24-28.70)
intrepid Ignored
(was needs-triage [reached end-of-life] now end-of-life)
jaunty
Released (2.6.28-19.61)
karmic
Released (2.6.31-22.60)
lucid
Released (2.6.32-22.35)
upstream
Released (2.6.34~rc4)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
dapper
Released (2.6.15-55.84)
hardy Does not exist

intrepid Does not exist

jaunty Does not exist

karmic Does not exist

lucid Does not exist

upstream
Released (2.6.34~rc4)