First published: Thu Oct 27 2011(Updated: )
crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call, as demonstrated by a write operation on an AF_ALG socket.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <3.1 | |
Linux Kernel | <3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4081 has a severity rating that indicates it can cause a denial of service due to a NULL pointer dereference.
To fix CVE-2011-4081, update the Linux kernel to version 3.1 or higher.
CVE-2011-4081 affects local users of the Linux kernel versions prior to 3.1.
The impact of CVE-2011-4081 includes potential denial of service and runtime errors due to ghash_setkey function calls.
All versions of the Linux kernel prior to 3.1 are vulnerable to CVE-2011-4081.