Unrated severityNVD Advisory· Published Jun 13, 2012· Updated Apr 29, 2026
CVE-2011-2183
CVE-2011-2183
Description
Race condition in the scan_get_next_rmap_item function in mm/ksm.c in the Linux kernel before 2.6.39.3, when Kernel SamePage Merging (KSM) is enabled, allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted application.
Affected products
10cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: <=2.6.39.2
- cpe:2.3:o:linux:linux_kernel:2.6.39:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39.1:*:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:2.6.39:rc7:*:*:*:*:*:*
Patches
12b472611a32aksm: fix NULL pointer dereference in scan_get_next_rmap_item()
1 file changed · +6 −0
mm/ksm.c+6 −0 modified@@ -1302,6 +1302,12 @@ static struct rmap_item *scan_get_next_rmap_item(struct page **page) slot = list_entry(slot->mm_list.next, struct mm_slot, mm_list); ksm_scan.mm_slot = slot; spin_unlock(&ksm_mmlist_lock); + /* + * Although we tested list_empty() above, a racing __ksm_exit + * of the last mm on the list may have removed it since then. + */ + if (slot == &ksm_mm_head) + return NULL; next_mm: ksm_scan.address = 0; ksm_scan.rmap_list = &slot->rmap_list;
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.