First published: Wed Dec 14 2011(Updated: )
Don't write more than the requested number of bytes of an batman-adv icmp packet to the userspace buffer. Otherwise unrelated userspace memory might get overwritten by the kernel. <a href="https://lists.open-mesh.org/pipermail/b.a.t.m.a.n/2011-December/005908.html">https://lists.open-mesh.org/pipermail/b.a.t.m.a.n/2011-December/005908.html</a> Statement: Not vulnerable. This issue did not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4, 5, 6, and Red Hat Enterprise MRG as they did not include support for the BATMAN (Better Approach To Mobile Ad-hoc Networking) out-of-tree kernel module. Acknowledgements: Red Hat would like to thank Paul Kot for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.2.46 | |
Linux Kernel | =3.2 | |
Linux Kernel | =3.2 | |
Linux Kernel | =3.2-rc2 | |
Linux Kernel | =3.2-rc3 | |
Linux Kernel | =3.2-rc4 | |
Linux Kernel | =3.2-rc5 | |
Linux Kernel | =3.2-rc6 | |
Linux Kernel | =3.2-rc7 | |
Linux Kernel | =3.2.1 | |
Linux Kernel | =3.2.1 | |
Linux Kernel | =3.2.2 | |
Linux Kernel | =3.2.3 | |
Linux Kernel | =3.2.4 | |
Linux Kernel | =3.2.5 | |
Linux Kernel | =3.2.6 | |
Linux Kernel | =3.2.7 | |
Linux Kernel | =3.2.8 | |
Linux Kernel | =3.2.9 | |
Linux Kernel | =3.2.10 | |
Linux Kernel | =3.2.11 | |
Linux Kernel | =3.2.12 | |
Linux Kernel | =3.2.13 | |
Linux Kernel | =3.2.14 | |
Linux Kernel | =3.2.15 | |
Linux Kernel | =3.2.16 | |
Linux Kernel | =3.2.17 | |
Linux Kernel | =3.2.18 | |
Linux Kernel | =3.2.19 | |
Linux Kernel | =3.2.20 | |
Linux Kernel | =3.2.21 | |
Linux Kernel | =3.2.22 | |
Linux Kernel | =3.2.23 | |
Linux Kernel | =3.2.24 | |
Linux Kernel | =3.2.25 | |
Linux Kernel | =3.2.26 | |
Linux Kernel | =3.2.27 | |
Linux Kernel | =3.2.28 | |
Linux Kernel | =3.2.29 | |
Linux Kernel | =3.2.30 | |
Linux Kernel | =3.2.31 | |
Linux Kernel | =3.2.32 | |
Linux Kernel | =3.2.33 | |
Linux Kernel | =3.2.34 | |
Linux Kernel | =3.2.35 | |
Linux Kernel | =3.2.36 | |
Linux Kernel | =3.2.37 | |
Linux Kernel | =3.2.38 | |
Linux Kernel | =3.2.39 | |
Linux Kernel | =3.2.40 | |
Linux Kernel | =3.2.41 | |
Linux Kernel | =3.2.42 | |
Linux Kernel | =3.2.43 | |
Linux Kernel | =3.2.44 | |
Linux Kernel | =3.2.45 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-4604 is rated as high due to the potential for memory corruption in the Linux kernel.
To fix CVE-2011-4604, update the Linux kernel to a version higher than 3.2.46.
CVE-2011-4604 affects multiple versions of the Linux kernel, specifically versions 3.2 and below.
CVE-2011-4604 is a memory corruption vulnerability that could allow malicious userspace memory to be overwritten by the kernel.
Yes, CVE-2011-4604 could potentially lead to a system compromise if exploited, allowing unauthorized access or control.