CVE-2011-4112

The net subsystem in the Linux kernel before 3.1 does not properly restrict use of the IFF_TX_SKB_SHARING flag, which allows local users to cause a denial of service (panic) by leveraging the CAP_NET_ADMIN capability to access /proc/net/pktgen/pgctrl, and then using the pktgen package in conjunction with a bridge device for a VLAN interface.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:avaya:9608_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:9608:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:avaya:9608g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:9608g:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:avaya:9611g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:9611g:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:avaya:9621g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:9621g:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:avaya:9641g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:9641g:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:avaya:9641gs_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:9641gs:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:31

Type Values Removed Values Added
References () http://downloads.avaya.com/css/P8/documents/100156038 - Third Party Advisory () http://downloads.avaya.com/css/P8/documents/100156038 - Third Party Advisory
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=550fd08c2cebad61c548def135f67aba284c6162 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=550fd08c2cebad61c548def135f67aba284c6162 -
References () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 - Mailing List, Patch, Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 - Mailing List, Patch, Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2011/11/21/4 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/11/21/4 - Mailing List, Patch, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=751006 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=751006 - Exploit, Issue Tracking, Patch, Third Party Advisory
References () https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/550fd08c2cebad61c548def135f67aba284c6162 - Patch, Third Party Advisory

Information

Published : 2012-05-17 11:00

Updated : 2024-11-21 01:31


NVD link : CVE-2011-4112

Mitre link : CVE-2011-4112

CVE.ORG link : CVE-2011-4112


JSON object : View

Products Affected

avaya

  • 9608
  • 9641gs
  • 9608g
  • 9641g
  • 9621g_firmware
  • 9611g
  • 9608g_firmware
  • 9641gs_firmware
  • 9621g
  • 9611g_firmware
  • 9641g_firmware
  • 9608_firmware

linux

  • linux_kernel