Vulnerability Description
The perf subsystem in the kernel package 2.6.32-122.el6.x86_64 in Red Hat Enterprise Linux (RHEL) 6 does not properly handle NMIs, which might allow local users to cause a denial of service (excessive log messages) via unspecified vectors.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 6.0 |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=688547
- https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d
- https://bugzilla.redhat.com/show_bug.cgi?id=688547
- https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d
FAQ
What is CVE-2011-2693?
CVE-2011-2693 is a vulnerability with a CVSS score of 1.9 (LOW). The perf subsystem in the kernel package 2.6.32-122.el6.x86_64 in Red Hat Enterprise Linux (RHEL) 6 does not properly handle NMIs, which might allow local users to cause a denial of service (excessive...
How severe is CVE-2011-2693?
CVE-2011-2693 has been rated LOW with a CVSS base score of 1.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2693?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux.