CVE-2011-2213

Linux kernel <2.6.39.3 - DoS

Title source: llm
STIX 2.1

Description

The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.

References (13)

Core 13
Core References
Patch, Third Party Advisory x_refsource_confirm
http://patchwork.ozlabs.org/patch/100857/
Broken Link mailing-list x_refsource_mlist
http://article.gmane.org/gmane.linux.network/198809
Third Party Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2011-0927.html
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=714536
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2011/06/20/1
Broken Link mailing-list x_refsource_mlist
http://article.gmane.org/gmane.linux.network/197206
Broken Link mailing-list x_refsource_mlist
http://article.gmane.org/gmane.linux.network/197208
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2011/06/20/13
Broken Link mailing-list x_refsource_mlist
http://article.gmane.org/gmane.linux.network/197386
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2011/06/20/16
Third Party Advisory vendor-advisory x_refsource_hp
http://marc.info/?l=bugtraq&m=139447903326211&w=2

Scores

EPSS 0.0006
EPSS Percentile 19.4%

Details

CWE
CWE-835
Status published
Products (6)
linux/linux_kernel < 2.6.39.3
redhat/enterprise_linux_aus 5.6
redhat/enterprise_linux_desktop 5.0
redhat/enterprise_linux_eus 5.6
redhat/enterprise_linux_server 5.0
redhat/enterprise_linux_workstation 5.0
Published Aug 29, 2011
Tracked Since Feb 18, 2026