CVE-2011-1163

Published: 09 April 2011

The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.

From the Ubuntu security team

Timo Warns discovered that OSF partition parsing routines did not correctly clear memory. A local attacker with physical access could plug in a specially crafted block device to read kernel memory, leading to a loss of privacy.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
Patches:
Upstream: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-source-2.6.15
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.38)