CVE-2011-1023
Published Jun 21, 2012
Last updated 2 years ago
Overview
- Description
- The Reliable Datagram Sockets (RDS) subsystem in the Linux kernel before 2.6.38 does not properly handle congestion map updates, which allows local users to cause a denial of service (BUG_ON and system crash) via vectors involving (1) a loopback (aka loop) transmit operation or (2) an InfiniBand (aka ib) transmit operation.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "084AC06C-2438-4BD5-A28D-8D24DE515135", "versionEndIncluding": "2.6.37.6" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18CBFC41-E9A9-456C-8A61-8DB2E6CE2E98" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2EA6C6E6-CAD5-4D43-AD96-66D5ACBB91CE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "71905CF7-7C7B-43AC-970D-D3187A807903" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "201421C9-E054-4FEB-A37A-8C314F242FBC" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F157225D-C62C-465D-A758-DE6A6C48C397" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77BB49A9-39D0-49C4-A241-D1537590F508" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF9A28CB-B307-4D0B-AC45-73964F766B09" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51838021-099C-4135-94E6-EC0276BAB750" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0F4EBC4-1C6D-428C-9F23-8508EBBD3588" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86233BC-2B7D-44EB-8253-458E89046B17" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.37.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "110BB215-C869-4BEB-962D-81A1F9F896B6" } ], "operator": "OR" } ] } ]