First published: Mon Jun 20 2011(Updated: )
A malicious user or buggy application can inject code and trigger an infinite loop in inet_diag_bc_audit() Also make sure each instruction is aligned on 4 bytes boundary, to avoid unaligned accesses. <a href="http://thread.gmane.org/gmane.linux.network/197206/focus=197386">http://thread.gmane.org/gmane.linux.network/197206/focus=197386</a> <a href="http://patchwork.ozlabs.org/patch/100857/">http://patchwork.ozlabs.org/patch/100857/</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.39.3 | |
redhat enterprise linux aus | =5.6 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux eus | =5.6 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux workstation | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2213 is considered a high severity vulnerability due to its potential to allow code injection and trigger an infinite loop.
To fix CVE-2011-2213, users should upgrade to a patched version of the Linux kernel where the vulnerability has been addressed.
CVE-2011-2213 affects various versions of the Linux kernel, particularly those prior to 2.6.39.3.
The potential impacts include system instability and denial of service caused by an infinite loop triggered by malicious users or applications.
CVE-2011-2213 is known to have been exploited in specific conditions, making it a significant concern for users of affected Linux versions.