First published: Fri Nov 04 2011(Updated: )
A flaw was found in the way Linux kernel handled user-defined key types. An unprivileged local user could use this flaw to crash the system. Reference: <a href="https://lkml.org/lkml/2011/11/15/363">https://lkml.org/lkml/2011/11/15/363</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-274.12.1.el5 | 0:2.6.18-274.12.1.el5 |
redhat/kernel | <0:2.6.32-220.el6 | 0:2.6.32-220.el6 |
redhat/kernel | <0:2.6.32-131.25.1.el6 | 0:2.6.32-131.25.1.el6 |
redhat/kernel-rt | <0:2.6.33.9-rt31.79.el6 | 0:2.6.33.9-rt31.79.el6 |
redhat/kernel-rt | <0:3.0.18-rt34.53.el6 | 0:3.0.18-rt34.53.el6 |
debian/linux-2.6 | ||
Linux kernel | =2.6 | |
Linux Kernel | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2011-4110 is classified as a medium severity vulnerability due to its potential to crash the system when exploited by an unprivileged user.
To fix CVE-2011-4110, update the Linux kernel to versions 2.6.18-274.12.1.el5, 2.6.32-220.el6, or other remedial versions listed for your Linux distribution.
CVE-2011-4110 affects specific versions of the Linux kernel including 2.6.18, 2.6.32, and others as indicated in the vulnerability details.
No, CVE-2011-4110 requires local access because it involves an unprivileged local user exploiting the flaw.
CVE-2011-4110 is a denial of service vulnerability that impacts the stability of the Linux kernel.