CVE-2011-2182
Published: 03 June 2011
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
From the Ubuntu security team
Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM partitions. A local user could exploit this to cause a denial of service or escalate privileges.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(3.11.0-12.19)
|
|
Patches: Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Fixed by cae13fe4cc3f24820ffb990c09110626837e85d4 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-flo Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-1.3])
|
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-1.7])
|
|
linux-grouper Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.1.10-8.28])
|
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-backport-oneiric Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-maguro Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.0.0-3.18])
|
|
linux-mako Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-3.21])
|
|
linux-manta Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-4.19])
|
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc1)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182
- http://lkml.org/lkml/2011/5/6/407
- http://lkml.org/lkml/2011/6/1/119
- http://openwall.com/lists/oss-security/2011/02/23/16
- https://usn.ubuntu.com/usn/usn-1341-1
- https://usn.ubuntu.com/usn/usn-1203-1
- https://usn.ubuntu.com/usn/usn-1208-1
- https://usn.ubuntu.com/usn/usn-1193-1
- https://usn.ubuntu.com/usn/usn-1218-1
- https://usn.ubuntu.com/usn/usn-1216-1
- https://usn.ubuntu.com/usn/usn-1383-1
- https://usn.ubuntu.com/usn/usn-1390-1
- https://usn.ubuntu.com/usn/usn-1392-1
- https://usn.ubuntu.com/usn/usn-1394-1
- https://usn.ubuntu.com/usn/usn-1256-1
- https://usn.ubuntu.com/usn/usn-1332-1
- NVD
- Launchpad
- Debian