{
  "threat_severity" : "Important",
  "public_date" : "2011-03-08T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: deficiency in handling of invalid data packets in lockd",
    "id" : "678144",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=678144"
  },
  "cvss" : {
    "cvss_base_score" : "5.7",
    "cvss_scoring_vector" : "AV:A/AC:M/Au:N/C:N/I:N/A:C",
    "status" : "verified"
  },
  "details" : [ "Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function." ],
  "statement" : "This issue only affects Red Hat Enterprise Linux 6 as we did not properly backport upstream commit b48fa6b9. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG are not affected.",
  "acknowledgement" : "Red Hat would like to thank Adam Prince for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2011-03-08T00:00:00Z",
    "advisory" : "RHSA-2011:0329",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-71.18.2.el6"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise MRG 1",
    "fix_state" : "Affected",
    "package_name" : "kernel-rt",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:1"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2011-0714\nhttps://nvd.nist.gov/vuln/detail/CVE-2011-0714" ],
  "name" : "CVE-2011-0714",
  "csaw" : false
}