First published: Thu Dec 15 2011(Updated: )
A PMC is 32 bits (ie an int). Since we pass it around as an unsigned long, we need to cast it before doing the comparison. This does not affect the upstream kernel as it is already fixed. This is an issue that was introduced in <a class="bz_bug_link bz_secure " title="" href="show_bug.cgi?id=720743">bug 720743</a>. Upstream commit: <a href="http://git.kernel.org/linus/0837e3242c73566fc1c0196b4ec61779c25ffc93">http://git.kernel.org/linus/0837e3242c73566fc1c0196b4ec61779c25ffc93</a> Acknowledgements: Red Hat would like to thank Maynard Johnson for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.39 | |
Linux Kernel | <2.6.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4611 is considered a low severity vulnerability as it does not affect the upstream kernel which has already been fixed.
To fix CVE-2011-4611, update the Linux kernel to version 2.6.39 or later.
CVE-2011-4611 affects Linux Kernel versions prior to 2.6.39.
No, users of the latest Linux distributions are not affected since the vulnerability has already been fixed upstream.
CVE-2011-4611 is primarily a type casting issue related to the handling of the process management context (PMC) in the kernel.