ID CVE-2011-4131
Summary The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words.
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*
CVSS
Base: 4.6 (as of 29-12-2017 - 02:29)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
ADJACENT_NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:A/AC:H/Au:N/C:N/I:N/A:C
redhat via4
advisories
  • bugzilla
    id 824287
    title [REGRESSION] be2iscsi: fix dma free size mismatch
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhba:tst:20111656001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhba:tst:20111656002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhba:tst:20111656003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhba:tst:20111656004
    • OR
      • AND
        • comment kernel is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862005
        • comment kernel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842006
      • AND
        • comment kernel-bootwrapper is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862009
        • comment kernel-bootwrapper is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842010
      • AND
        • comment kernel-debug is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862017
        • comment kernel-debug is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842012
      • AND
        • comment kernel-debug-devel is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862013
        • comment kernel-debug-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842014
      • AND
        • comment kernel-devel is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862015
        • comment kernel-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842016
      • AND
        • comment kernel-doc is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862025
        • comment kernel-doc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842024
      • AND
        • comment kernel-firmware is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862027
        • comment kernel-firmware is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842026
      • AND
        • comment kernel-headers is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862007
        • comment kernel-headers is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842008
      • AND
        • comment kernel-kdump is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862021
        • comment kernel-kdump is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842018
      • AND
        • comment kernel-kdump-devel is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862023
        • comment kernel-kdump-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842020
      • AND
        • comment perf is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862011
        • comment perf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20100842022
      • AND
        • comment python-perf is earlier than 0:2.6.32-279.el6
          oval oval:com.redhat.rhsa:tst:20120862019
        • comment python-perf is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20111530020
    rhsa
    id RHSA-2012:0862
    released 2012-06-20
    severity Moderate
    title RHSA-2012:0862: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update (Moderate)
  • rhsa
    id RHSA-2012:1541
rpms
  • kernel-0:2.6.32-279.el6
  • kernel-bootwrapper-0:2.6.32-279.el6
  • kernel-debug-0:2.6.32-279.el6
  • kernel-debug-devel-0:2.6.32-279.el6
  • kernel-devel-0:2.6.32-279.el6
  • kernel-doc-0:2.6.32-279.el6
  • kernel-firmware-0:2.6.32-279.el6
  • kernel-headers-0:2.6.32-279.el6
  • kernel-kdump-0:2.6.32-279.el6
  • kernel-kdump-devel-0:2.6.32-279.el6
  • perf-0:2.6.32-279.el6
  • python-perf-0:2.6.32-279.el6
refmap via4
confirm
fedora FEDORA-2012-8359
mlist [oss-security] 20111111 Re: CVE Request -- kernel: nfs4_getfacl decoding kernel oops
secunia 48898
suse
  • SUSE-SU-2012:0554
  • openSUSE-SU-2013:0925
Last major update 29-12-2017 - 02:29
Published 17-05-2012 - 11:00
Back to Top