First published: Mon Jun 20 2011(Updated: )
A malicious user or buggy application can inject code and trigger an infinite loop in inet_diag_bc_audit() Also make sure each instruction is aligned on 4 bytes boundary, to avoid unaligned accesses. <a href="http://thread.gmane.org/gmane.linux.network/197206/focus=197386">http://thread.gmane.org/gmane.linux.network/197206/focus=197386</a> <a href="http://patchwork.ozlabs.org/patch/100857/">http://patchwork.ozlabs.org/patch/100857/</a> Acknowledgements: Red Hat would like to thank Dan Rosenberg for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <2.6.39.3 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Server EUS | =5.6 | |
Red Hat Enterprise Linux | =5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2213 is considered a high severity vulnerability due to its potential to allow code injection and trigger an infinite loop.
To fix CVE-2011-2213, users should upgrade to a patched version of the Linux kernel where the vulnerability has been addressed.
CVE-2011-2213 affects various versions of the Linux kernel, particularly those prior to 2.6.39.3.
The potential impacts include system instability and denial of service caused by an infinite loop triggered by malicious users or applications.
CVE-2011-2213 is known to have been exploited in specific conditions, making it a significant concern for users of affected Linux versions.