A locally locally exploitable DOS vulnerability was found in pax-linux versions 2.6.32.33-test79.patch, 2.6.38-test3.patch, and 2.6.37.4-test14.patch. A bad bounds check in arch_get_unmapped_area_topdown triggered by programs doing an mmap after a MAP_GROWSDOWN mmap will create an infinite loop condition without releasing the VM semaphore eventually leading to a system crash.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2011/q1/579 | Mailing List Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1474 | Third Party Advisory |
http://seclists.org/oss-sec/2011/q1/579 | Mailing List Third Party Advisory |
https://security-tracker.debian.org/tracker/CVE-2011-1474 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2011/q1/579 - Mailing List, Third Party Advisory | |
References | () https://security-tracker.debian.org/tracker/CVE-2011-1474 - Third Party Advisory |
Information
Published : 2019-12-26 19:15
Updated : 2024-11-21 01:26
NVD link : CVE-2011-1474
Mitre link : CVE-2011-1474
CVE.ORG link : CVE-2011-1474
JSON object : View
Products Affected
linux
- linux_kernel