First published: Wed Feb 02 2011(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-238.9.1.el5 | 0:2.6.18-238.9.1.el5 |
redhat/kernel | <0:2.6.32-71.24.1.el6 | 0:2.6.32-71.24.1.el6 |
redhat/kernel-rt | <0:2.6.33.9-rt31.75.el6 | 0:2.6.33.9-rt31.75.el6 |
debian/linux-2.6 | ||
Linux kernel | <2.6.38 | |
Linux Kernel | <2.6.38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2011-1478 has a moderate severity, as it can lead to denial of service through a NULL pointer dereference.
To fix CVE-2011-1478, update the Linux kernel to a version later than 2.6.38.
CVE-2011-1478 affects Linux kernel versions before 2.6.38.
Exploiting CVE-2011-1478 could result in a denial of service, potentially crashing the system.
There are no known workarounds for CVE-2011-1478, so upgrading the kernel is the recommended action.