CVE-2011-2534

7.8 HIGH
Published: June 22, 2011 Modified: April 29, 2026
View on NVD

Description

Buffer overflow in the clusterip_proc_write function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might allow local users to cause a denial of service or have unspecified other impact via a crafted write operation, related to string data that lacks a terminating '\0' character.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=netfilter&m=129978077509888&w=2
Source: cve@mitre.org
Patch Third Party Advisory
http://marc.info/?l=netfilter-devel&m=130036157327564&w=2
Source: cve@mitre.org
Patch Third Party Advisory
http://securityreason.com/securityalert/8284
Source: cve@mitre.org
Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
Source: cve@mitre.org
Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2011/03/18/15
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/03/21/1
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/03/21/4
Source: cve@mitre.org
Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/46921
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=689337
Source: cve@mitre.org
Issue Tracking Patch Third Party Advisory
http://marc.info/?l=netfilter&m=129978077509888&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://marc.info/?l=netfilter-devel&m=130036157327564&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://securityreason.com/securityalert/8284
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Vendor Advisory
http://www.openwall.com/lists/oss-security/2011/03/18/15
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/03/21/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2011/03/21/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/46921
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=689337
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Third Party Advisory

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
EPSS (Exploit Probability)
0.0%
13th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

linux