4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:N/I:N/A:C
kernel is vulnerable to denial of service (DoS). The vulnerability exists through inconsistency in the methods for allocating and freeing NFSv4 ACL data; CVE-2010-4250 fix caused a regression; a flaw in next_pidmap() and inet_diag_bc_audit(); flaws in the CAN implementation; a race condition in the memory merging support; a flaw in the taskstats subsystem; and the way mapping expansions were handled could allow a local, unprivileged user to cause a denial of service.
ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.3
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b472611a32a72f4a118c069c2d62a1a3f087afd
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2b472611a32a72f4a118c069c2d62a1a3f087afd
www.openwall.com/lists/oss-security/2011/06/06/1
access.redhat.com/errata/RHSA-2011:1253
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=710338
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/2.0/html/Technical_Notes/index.html
github.com/torvalds/linux/commit/2b472611a32a72f4a118c069c2d62a1a3f087afd