Описание
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
eoan | DNE | |
esm-infra-legacy/trusty | not-affected | 1.0.16-1 |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | 1.0.16-1 |
focal | DNE |
Показывать по
5.8 Medium
CVSS2
Связанные уязвимости
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6 ...
librdmacm 1.0.16, when ibacm.port is not specified, connects to port 6125, which allows remote attackers to specify the address resolution information for the application via a malicious ib_acm service.
ELSA-2013-1661: rdma stack security, bug fix, and enhancement update (MODERATE)
5.8 Medium
CVSS2