5.7
CVSSv2

CVE-2011-3593

Published: 08/06/2013 Updated: 13/02/2023
CVSS v2 Base Score: 5.7 | Impact Score: 6.9 | Exploitability Score: 5.5
VMScore: 507
Vector: AV:A/AC:M/Au:N/C:N/I:N/A:C

Vulnerability Summary

A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote malicious users to cause a denial of service (system crash) via priority-tagged VLAN frames.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 6.0

linux linux kernel 2.6.32

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and various bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant secur ...
IPv6 fragment identification value generation could allow a remote attacker to disrupt a target system's networking, preventing legitimate users from accessing its services (CVE-2011-2699, Important) A signedness issue was found in the Linux kernel's CIFS (Common Internet File System) implementation A malicious CIFS server could send a specially- ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Multiple kernel flaws have been fixed ...
Several security issues were fixed in the kernel ...
Multiple kernel flaws have been fixed ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...