Medium severity5.5NVD Advisory· Published May 17, 2012· Updated Apr 29, 2026
CVE-2011-3637
CVE-2011-3637
Description
The m_stop function in fs/proc/task_mmu.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error.
Affected products
2- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
Patches
176597cd31470proc: fix oops on invalid /proc/<pid>/maps access
1 file changed · +2 −1
fs/proc/task_mmu.c+2 −1 modified@@ -182,7 +182,8 @@ static void m_stop(struct seq_file *m, void *v) struct proc_maps_private *priv = m->private; struct vm_area_struct *vma = v; - vma_stop(priv, vma); + if (!IS_ERR(vma)) + vma_stop(priv, vma); if (priv->task) put_task_struct(priv->task); }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- www.openwall.com/lists/oss-security/2012/02/06/1nvdMailing ListPatchThird Party Advisory
- github.com/torvalds/linux/commit/76597cd31470fa130784c78fadb4dab2e624a723nvdPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39nvdBroken Link
News mentions
0No linked articles in our index yet.