Red Hat Customer Portal

Skip to main content


Public Date:
2012-A-0056, 2012-A-0020
714867: CVE-2011-2482 kernel: sctp dos

The MITRE CVE dictionary describes this issue as:

A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.

Find out more about CVE-2011-2482 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 3ab224be6d6. It did not affect the Linux kernels as shipped with Red Hat Enterprise Linux 6, and Red Hat Enterprise MRG as they have backported the upstream commit ea2bc483ff5 that Red Hat Enterprise Linux 5 did not. This has been addressed in Red Hat Enterprise Linux 5 via

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 7.8
Base Metrics AV:N/AC:L/Au:N/C:N/I:N/A:C
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2011:1813 2011-12-13
Red Hat Enterprise Linux 5 (kernel) RHSA-2011:1212 2011-09-06

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 6 kernel Not affected
Red Hat Enterprise Linux 4 kernel Not affected

Last Modified