Analysis and contextual insights are available on OpenCVE Cloud.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 5 | |||
| kernel-0:2.6.18-238.12.1.el5 | cpe:/o:redhat:enterprise_linux:5 | RHSA-2011:0833 | 2011-05-31T00:00:00Z |
| Red Hat Enterprise Linux 6 | |||
| kernel-0:2.6.32-131.0.15.el6 | cpe:/o:redhat:enterprise_linux:6 | RHSA-2011:0542 | 2011-05-19T00:00:00Z |
| Red Hat Enterprise Linux 6.0 EUS - Server Only | |||
| kernel-0:2.6.32-71.31.1.el6 | cpe:/o:redhat:rhel_eus:6.0 | RHSA-2011:0883 | 2011-06-21T00:00:00Z |
| Red Hat Enterprise MRG 2 | |||
| kernel-rt-0:2.6.33.9-rt31.75.el6rt | cpe:/a:redhat:enterprise_mrg:2:server:el6 | RHSA-2011:1253 | 2011-09-12T00:00:00Z |
No data available yet.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2240-1 | linux-2.6 security update |
EUVD |
EUVD-2011-1498 | drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions. |
Ubuntu USN |
USN-1159-1 | Linux kernel vulnerabilities (Marvell Dove) |
Ubuntu USN |
USN-1160-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1161-1 | Linux kernel vulnerabilities (EC2) |
Ubuntu USN |
USN-1162-1 | Linux kernel vulnerabilities (Marvell Dove) |
Ubuntu USN |
USN-1164-1 | Linux kernel vulnerabilities (i.MX51) |
Ubuntu USN |
USN-1167-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1168-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1187-1 | Linux kernel (Maverick backport) vulnerabilities |
Ubuntu USN |
USN-1202-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1212-1 | Linux kernel (OMAP4) vulnerabilities |
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.00129.
Key SSVC decision points have not yet been added.
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:28:41.810Z
Reserved: 2011-03-21T00:00:00.000Z
Link: CVE-2011-1495
No data.
Status : Modified
Published: 2011-05-03T19:55:08.433
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-1495
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN