Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Advisories
Source ID Title
EUVD EUVD EUVD-2011-4048 Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Ubuntu USN Ubuntu USN USN-1363-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1364-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1380-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1384-1 Linux kernel (Oneiric backport) vulnerabilities
Ubuntu USN Ubuntu USN USN-1386-1 Linux kernel (Natty backport) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T23:53:32.691Z

Reserved: 2011-10-18T00:00:00Z

Link: CVE-2011-4097

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-05-17T11:00:32.303

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-4097

cve-icon Redhat

Severity : Moderate

Publid Date: 2011-10-31T00:00:00Z

Links: CVE-2011-4097 - Bugzilla

cve-icon OpenCVE Enrichment

No data.