CVE-2011-4097Integer Overflow or Wraparound in Kernel

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 77.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 17
Latest updateMay 13

Description

Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages2 packages

NVDlinux/linux_kernel< 3.1.8
Ubuntulinux/linux_kernel< 3.11.0-12.19+1

Also affects: Enterprise Linux 6.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-m47x-jm96-r95m: Integer overflow in the oom_badness function in mm/oom_kill2022-05-13
OSV
CVE-2011-4097: Integer overflow in the oom_badness function in mm/oom_kill2011-10-31

📋Vendor Advisories

6
Ubuntu
Linux kernel (Oneiric backport) vulnerabilities2012-03-06
Ubuntu
Linux kernel (Natty backport) vulnerabilities2012-03-06
Ubuntu
Linux kernel vulnerabilities2012-02-29
Ubuntu
Linux kernel vulnerabilities2012-02-13
Ubuntu
Linux kernel (OMAP4) vulnerabilities2012-02-13

💬Community

2
Bugzilla
CVE-2011-4097 kernel: oom_badness() integer overflow2011-11-01
Bugzilla
CVE-2011-4097 kernel: oom_badness() integer overflow [fedora-all]2011-11-01