First published: Wed Aug 24 2011(Updated: )
Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <3.0.5 | |
Red Hat Enterprise Linux | =4.0 | |
Linux Kernel | <3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3191 is rated as a high severity vulnerability due to its potential for causing denial of service and memory corruption.
To fix CVE-2011-3191, upgrade your Linux kernel to version 3.1 or newer, which includes the necessary patches.
CVE-2011-3191 affects Linux kernel versions before 3.1, specifically versions prior to 3.0.5.
CVE-2011-3191 can be exploited by remote CIFS servers sending a large length value in a directory read request, leading to potential memory corruption.
Yes, Red Hat Enterprise Linux version 4.0 and various versions of Debian's linux-2.6 are known to be affected by CVE-2011-3191.