CVE-2011-2517
Published: 06 October 2011
Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.
From the Ubuntu security team
It was discovered that the wireless stack incorrectly verified SSID lengths. A local attacker could exploit this to cause a denial of service or gain root privileges.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(4.2.0-16.19)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(3.11.0-12.19)
|
|
Patches: Introduced by 2a5193119269062608582418deba7af82844159a Fixed by 208c72f4fe44fe09577e7975ba0e7fa0278f3d03 Introduced by 2a5193119269062608582418deba7af82844159a Fixed by 57a27e1d6a3bb9ad4efeebd3a8c71156d6207536 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-ec2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-flo Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(3.4.0-3.15)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-1.3])
|
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(3.4.0-4.23)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-1.9])
|
|
linux-grouper Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.1.10-8.28])
|
|
linux-lts-backport-maverick Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-backport-natty Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-backport-oneiric Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-raring Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.16.0-25.33~14.04.2])
|
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.19.0-18.18~14.04.1])
|
|
linux-maguro Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.0.0-3.18])
|
|
linux-mako Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(3.4.0-5.34)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-3.21])
|
|
linux-manta Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(3.4.0-6.29)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was not-affected [3.4.0-4.19])
|
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(4.2.0-1014.21)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(3.0~rc3)
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517
- https://rhn.redhat.com/errata/RHSA-2011-1212.html
- https://usn.ubuntu.com/usn/usn-1241-1
- https://usn.ubuntu.com/usn/usn-1244-1
- https://usn.ubuntu.com/usn/usn-1269-1
- https://usn.ubuntu.com/usn/usn-1272-1
- https://usn.ubuntu.com/usn/usn-1274-1
- https://usn.ubuntu.com/usn/usn-1272-1
- https://usn.ubuntu.com/usn/usn-1278-1
- https://usn.ubuntu.com/usn/usn-1279-1
- https://usn.ubuntu.com/usn/usn-1281-1
- https://usn.ubuntu.com/usn/usn-1285-1
- https://usn.ubuntu.com/usn/usn-1286-1
- NVD
- Launchpad
- Debian