Vulnerability Details : CVE-2011-0999
mm/huge_memory.c in the Linux kernel before 2.6.38-rc5 does not prevent creation of a transparent huge page (THP) during the existence of a temporary stack for an exec system call, which allows local users to cause a denial of service (memory consumption) or possibly have unspecified other impact via a crafted application.
Vulnerability category: Denial of service
Products affected by CVE-2011-0999
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.38:-:*:*:*:*:*:*
Threat overview for CVE-2011-0999
Top countries where our scanners detected CVE-2011-0999
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2011-0999 1,472
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-0999!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-0999
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-0999
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2011-0999
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0999
-
https://bugzilla.redhat.com/show_bug.cgi?id=678209
678209 – (CVE-2011-0999) CVE-2011-0999 kernel: thp: prevent hugepages during args/env copying into the user stackIssue Tracking;Patch;Third Party Advisory
-
http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.38-rc5
404: File not foundBroken Link
-
http://www.securityfocus.com/bid/46442
Linux Kernel Transparent Hugepages Local Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
http://openwall.com/lists/oss-security/2011/02/17/6
oss-security - Re: CVE request - kernel: thp: prevent hugepages during args/env copying into the user stackMailing List;Patch;Third Party Advisory
-
http://openwall.com/lists/oss-security/2011/02/17/3
oss-security - CVE request - kernel: thp: prevent hugepages during args/env copying into the user stackMailing List;Patch;Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/65535
Linux Kernel hugepages denial of service CVE-2011-0999 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31
Jump to