Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1488

Опубликовано: 20 апр. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1

Описание

The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.

РелизСтатусПримечание
dapper

DNE

devel

not-affected

hardy

released

2.6.24-28.70
intrepid

ignored

end of life, was needs-triage
jaunty

released

2.6.28-19.61
karmic

released

2.6.31-22.60
lucid

released

2.6.32-22.35
upstream

released

2.6.34~rc4

Показывать по

РелизСтатусПримечание
dapper

released

2.6.15-55.84
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

upstream

released

2.6.34~rc4

Показывать по

EPSS

Процентиль: 36%
0.00147
Низкий

2.1 Low

CVSS2

Связанные уязвимости

nvd
больше 15 лет назад

The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.

debian
больше 15 лет назад

The proc_oom_score function in fs/proc/base.c in the Linux kernel befo ...

github
больше 3 лет назад

The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.

EPSS

Процентиль: 36%
0.00147
Низкий

2.1 Low

CVSS2