CVE-2011-2928

Published: 29 August 2011

The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.

From the Ubuntu security team

Time Warns discovered that long symlinks were incorrectly handled on Be filesystems. A local attacker could exploit this with a malformed Be filesystem and crash the system, leading to a denial of service.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
Patches:
Upstream: http://git.kernel.org/linus/338d0f0a6fbc82407864606f5b64b75aeb3c70f2
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.1~rc3)