First published: Sat Jun 08 2013(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <=3.0 | |
Linux kernel | =3.0-rc2 | |
Linux kernel | =3.0-rc4 | |
Linux kernel | =3.0-rc6 | |
Linux kernel | =3.0-rc3 | |
Linux kernel | =3.0-rc1 | |
Linux kernel | =3.0-rc5 | |
debian/linux-2.6 | ||
Linux Kernel | <=3.0 | |
Linux Kernel | =3.0-rc1 | |
Linux Kernel | =3.0-rc2 | |
Linux Kernel | =3.0-rc3 | |
Linux Kernel | =3.0-rc4 | |
Linux Kernel | =3.0-rc5 | |
Linux Kernel | =3.0-rc6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3619 has a medium severity rating due to the potential for denial of service through NULL pointer dereference.
To fix CVE-2011-3619, update the Linux kernel to version 3.0 or later which addresses this vulnerability.
CVE-2011-3619 affects Linux kernel versions prior to 3.0, including various release candidates.
While CVE-2011-3619 primarily results in denial of service, it may potentially lead to unspecified other impacts.
Local users of systems running vulnerable versions of the Linux kernel may exploit CVE-2011-3619 to cause disruption.