CVE-2011-4097 REJECTED

Integer overflow in the oom_badness function in mm/oom_kill.c in the Linux kernel before 3.1.8 on 64-bit platforms allows local users to cause a denial of service (memory consumption or process termination) by using a certain large amount of memory.

EPSS 0.08% · 22.7th percentile

Risk Scores

EPSS Score
0.08%
22.7th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:14.04:LTSlinux-flo0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:16.04:LTSlinux-goldfish0, 3.4.0-4.26, 3.4.0-4.24
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:14.04:LTSlinux-manta0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux0
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:14.04:LTSlinux-goldfish3.4.0-1.7, 0
Ubuntu:16.04:LTSlinux-mako0, 3.4.0-7.39
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-flo3.4.0-5.19, 0
Ubuntu:14.04:LTSlinux-mako0

Timeline

References

Open in Interactive Console →