First published: Fri Apr 22 2011(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.38.5 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server EUS | =5.6 | |
Red Hat Enterprise Linux | =5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1746 has a high severity rating due to its potential to cause system crashes and denial of service.
To fix CVE-2011-1746, update your Linux kernel to version 2.6.38.5 or later.
CVE-2011-1746 affects the Linux kernel versions before 2.6.38.5.
Yes, CVE-2011-1746 can be exploited by local users to trigger buffer overflows.
The potential impacts of CVE-2011-1746 include denial of service and system crashes.