First published: Thu Apr 14 2011(Updated: )
Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-238.19.1.el5 | 0:2.6.18-238.19.1.el5 |
redhat/kernel | <0:2.6.32-131.17.1.el6 | 0:2.6.32-131.17.1.el6 |
redhat/kernel-rt | <0:2.6.33.9-rt31.75.el6 | 0:2.6.33.9-rt31.75.el6 |
debian/linux-2.6 | ||
Linux Kernel | <2.6.38.5 | |
Red Hat Enterprise Linux | =5.0 | |
redhat enterprise linux aus | =5.6 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =5.6 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2011-1745 has a high severity rating due to potential privilege escalation and system crashes.
To fix CVE-2011-1745, upgrade the Linux kernel to versions 2.6.38.5 or later.
CVE-2011-1745 affects Linux kernel versions prior to 2.6.38.5.
CVE-2011-1745 is an integer overflow vulnerability found in the agp_generic_insert_memory function.
Yes, local users can exploit CVE-2011-1745 to gain elevated privileges or cause a denial of service.