Описание
The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | DNE | |
| devel | not-affected | |
| hardy | released | 2.6.24-28.70 |
| intrepid | ignored | end of life, was needs-triage |
| jaunty | released | 2.6.28-19.61 |
| karmic | released | 2.6.31-22.60 |
| lucid | released | 2.6.32-22.35 |
| upstream | released | 2.6.34~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 2.6.15-55.84 |
| devel | DNE | |
| hardy | DNE | |
| intrepid | DNE | |
| jaunty | DNE | |
| karmic | DNE | |
| lucid | DNE | |
| upstream | released | 2.6.34~rc4 |
Показывать по
EPSS
2.1 Low
CVSS2
Связанные уязвимости
The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.
The proc_oom_score function in fs/proc/base.c in the Linux kernel befo ...
The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.
EPSS
2.1 Low
CVSS2