Vulnerability Details : CVE-2011-2183
Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2011-2183
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc7:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39.1:*:*:*:*:*:*:*
Threat overview for CVE-2011-2183
Top countries where our scanners detected CVE-2011-2183
Top open port discovered on systems with this issue
49152
IPs affected by CVE-2011-2183 1,556
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-2183!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-2183
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 13 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-2183
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:L/AC:H/Au:N/C:N/I:N/A:C |
1.9
|
6.9
|
NIST |
CWE ids for CVE-2011-2183
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-2183
-
http://www.openwall.com/lists/oss-security/2011/06/06/1
oss-security - Re: CVE request: kernel: ksm: race between ksmd and exiting task
-
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.3
404 Not Found
-
https://bugzilla.redhat.com/show_bug.cgi?id=710338
710338 – (CVE-2011-2183) CVE-2011-2183 kernel: ksm: race between ksmd and exiting task
-
https://github.com/torvalds/linux/commit/2b472611a32a72f4a118c069c2d62a1a3f087afd
ksm: fix NULL pointer dereference in scan_get_next_rmap_item() · torvalds/linux@2b47261 · GitHubPatch
-
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b472611a32a72f4a118c069c2d62a1a3f087afd
Jump to