Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2011-2183

Опубликовано: 13 июн. 2012
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4

Описание

Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.

РелизСтатусПримечание
devel

not-affected

3.0-2.3
esm-infra-legacy/trusty

not-affected

3.11.0-12.19
hardy

not-affected

lucid

released

2.6.32-34.77
maverick

released

2.6.35-31.62
natty

released

2.6.38-13.52
oneiric

not-affected

3.0-2.3
precise

not-affected

3.1.0-1.1
quantal

not-affected

saucy

not-affected

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

released

2.6.32-318.38
maverick

ignored

end of life
natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-1.3
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

DNE

trusty

not-affected

3.4.0-1.3
trusty/esm

DNE

trusty was not-affected [3.4.0-1.3]
upstream

released

3.0~rc4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-1.7
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-1.7
trusty/esm

DNE

trusty was not-affected [3.4.0-1.7]
upstream

released

3.0~rc4

Показывать по

РелизСтатусПримечание
devel

not-affected

3.1.10-8.28
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.1.10-8.28
trusty/esm

DNE

trusty was not-affected [3.1.10-8.28]
upstream

released

3.0~rc4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

released

2.6.35-31.62~lucid1
maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

released

2.6.38-13.52~lucid1
maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

not-affected

maverick

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

3.0.0-3.18
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.0.0-3.18
trusty/esm

DNE

trusty was not-affected [3.0.0-3.18]
upstream

released

3.0~rc4

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-3.21
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-3.21
trusty/esm

DNE

trusty was not-affected [3.4.0-3.21]
upstream

released

3.0~rc4

Показывать по

РелизСтатусПримечание
devel

not-affected

3.4.0-4.19
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]]
lucid

DNE

precise

DNE

quantal

DNE

saucy

ignored

trusty

not-affected

3.4.0-4.19
trusty/esm

DNE

trusty was not-affected [3.4.0-4.19]
upstream

released

3.0~rc4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

released

2.6.32-218.35
maverick

released

2.6.32-418.35
natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

saucy

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

hardy

DNE

lucid

DNE

maverick

released

2.6.35-903.26
natty

released

2.6.38-1209.17
oneiric

not-affected

3.0.0-1200.1
precise

not-affected

3.0.0-1401.2
quantal

not-affected

saucy

not-affected

Показывать по

EPSS

Процентиль: 26%
0.00086
Низкий

4 Medium

CVSS2

Связанные уязвимости

redhat
около 14 лет назад

Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.

nvd
около 13 лет назад

Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.

debian
около 13 лет назад

Race condition in the scan_get_next_rmap_item function in mm/ksm.c in ...

github
около 3 лет назад

Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.

oracle-oval
почти 14 лет назад

ELSA-2011-2025: Unbreakable Enterprise kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 26%
0.00086
Низкий

4 Medium

CVSS2

Уязвимость CVE-2011-2183