First published: Sat Jun 08 2013(Updated: )
The perf subsystem in the kernel package 2.6.32-122.el6.x86_64 in Red Hat Enterprise Linux (RHEL) 6 does not properly handle NMIs, which might allow local users to cause a denial of service (excessive log messages) via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2693 is classified as a low severity vulnerability due to its denial of service impact through excessive log messages.
To fix CVE-2011-2693, update Red Hat Enterprise Linux to a version that includes the patch for this vulnerability.
Local users on Red Hat Enterprise Linux 6.0 systems are affected by CVE-2011-2693.
CVE-2011-2693 is a denial of service vulnerability impacting the perf subsystem within the kernel.
CVE-2011-2693 was registered in 2011, indicating it has been a known issue for several years.