7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
kernel is vulnerable to denial of service (DoS). The vulnerability exists as the fix for CVE-2011-2482 provided by RHSA-2011:1212 introduced a regression: on systems that do not have Security-Enhanced Linux (SELinux) in Enforcing mode, a socket lock race could occur between sctp_rcv() and sctp_accept(). A remote attacker could use this flaw to cause a denial of service. By default, SELinux runs in Enforcing mode on Red Hat Enterprise Linux 5.
ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae53b5bd77719fed58086c5be60ce4f22bffe1c6
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ae53b5bd77719fed58086c5be60ce4f22bffe1c6
www.openwall.com/lists/oss-security/2012/03/05/2
access.redhat.com/errata/RHSA-2012:0007
access.redhat.com/security/cve/CVE-2011-4348
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=757143
docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2012-0007
github.com/torvalds/linux/commit/ae53b5bd77719fed58086c5be60ce4f22bffe1c6
rhn.redhat.com/errata/RHSA-2011-1212.html