Описание
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2011-4097
- https://github.com/torvalds/linux/commit/56c6a8a4aadca809e04276eabe5552935c51387f
- https://access.redhat.com/errata/RHSA-2012:0333
- https://access.redhat.com/security/cve/CVE-2011-4097
- https://bugzilla.redhat.com/show_bug.cgi?id=750399
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1.8
- http://www.openwall.com/lists/oss-security/2011/11/01/2
Связанные уязвимости
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.
Integer overflow in the oom_badness function in mm/oom_kill.c in the L ...