Oval Definition:oval:com.ubuntu.trusty:def:20112213000
Revision Date:2011-08-29Version:1
Title:CVE-2011-2213 on Ubuntu 14.04 LTS (trusty) - low.
Description:The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880. Dan Rosenberg discovered that the IPv4 diagnostic routines did not correctly validate certain requests. A local attacker could exploit this to consume CPU resources, leading to a denial of service.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2011-2213
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in trusty is not affected (note: '3.11.0-12.19').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in trusty is not affected (note: '3.4.0-1.3').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in trusty is not affected (note: '3.4.0-1.7').
  • OR NOT While related to the CVE in some way, the 'linux-grouper' package in trusty is not affected (note: '3.1.10-8.28').
  • OR NOT While related to the CVE in some way, the 'linux-maguro' package in trusty is not affected (note: '3.0.0-3.18').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in trusty is not affected (note: '3.4.0-3.21').
  • OR NOT While related to the CVE in some way, the 'linux-manta' package in trusty is not affected (note: '3.4.0-4.19').
  • BACK