Podatność CVE-2011-1771


Publikacja: 2011-09-06   Modyfikacja: 2012-02-13

Opis:
The cifs_close function in fs/cifs/file.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (NULL pointer dereference and BUG) or possibly have unspecified other impact by setting the O_DIRECT flag during an attempt to open a file on a CIFS filesystem.

W naszej bazie, znaleźliśmy następujące noty dla tego CVE:
Tytuł
Autor
Data
Low
linux kernel 2.6.38 related to O_DIRECT crash
Ben Greear
07.09.2011

Typ:

CWE-Other

Producent: Linux
Produkt: Kernel 
Wersje:
2.6.9
2.6.8.1
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.38.8
2.6.38.7
2.6.38.6
2.6.38.5
2.6.38.4
2.6.38.3
2.6.38.2
2.6.38.1
2.6.38
2.6.37.6
2.6.37.5
2.6.37.4
2.6.37.3
2.6.37.2
2.6.37.1
2.6.37
2.6.36.4
2.6.36.3
2.6.36.2
2.6.36.1
2.6.36
2.6.35.9
2.6.35.8
2.6.35.7
2.6.35.6
2.6.35.5
2.6.35.4
2.6.35.3
2.6.35.2
2.6.35.1
2.6.35
2.6.34.7
2.6.34.6
2.6.34.5
2.6.34.4
2.6.34.3
2.6.34.2
2.6.34.1
2.6.34
2.6.33.7
2.6.33.6
2.6.33.5
2.6.33.4
2.6.33.3
2.6.33.2
2.6.33.1
2.6.33
2.6.32.9
2.6.32.8
2.6.32.7
2.6.32.6
2.6.32.5
2.6.32.4
2.6.32.3
2.6.32.27
2.6.32.26
2.6.32.25
2.6.32.24
2.6.32.23
2.6.32.22
2.6.32.21
2.6.32.20
2.6.32.2
2.6.32.19
2.6.32.18
2.6.32.17
2.6.32.16
2.6.32.15
2.6.32.14
2.6.32.13
2.6.32.12
2.6.32.11
2.6.32.10
2.6.32.1
2.6.32
2.6.31.9
2.6.31.8
2.6.31.7
2.6.31.6
2.6.31.5
2.6.31.4
2.6.31.3
2.6.31.2
2.6.31.14
2.6.31.13
2.6.31.12
2.6.31.11
2.6.31.10
2.6.31.1
2.6.31
2.6.30.9
2.6.30.8
2.6.30.7
Zobacz więcej wersji na NVD

CVSS2 => (AV:L/AC:M/Au:N/C:N/I:N/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
4.7/10
6.9/10
3.4/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Lokalny
Średnia
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Brak
Brak
Pełny

 Referencje:
https://bugzilla.redhat.com/show_bug.cgi?id=703016
http://www.openwall.com/lists/oss-security/2011/05/09/2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7797069305d13252fd66cf722aa8f2cbeb3c95cd
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39
http://securityreason.com/securityalert/8367
http://marc.info/?l=linux-cifs&m=130204730006155&w=2
http://marc.info/?l=linux-cifs&m=130204357001849&w=2

Podobne CVE
CVE-2019-17351
An issue was discovered in drivers/xen/balloon.c in the Linux kernel before 5.2.3, as used in Xen through 4.12.x, allowing guest OS users to cause a denial of service because of unrestricted resource consumption during the mapping of guest memory, ak...
CVE-2019-17133
In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow.
CVE-2019-17075
An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable. This could allow an attacker to trigger a D...
CVE-2019-17056
llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
CVE-2019-17055
base_sock_create in drivers/isdn/mISDN/socket.c in the AF_ISDN network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-b91ee4aa2a21.
CVE-2019-17054
atalk_create in net/appletalk/ddp.c in the AF_APPLETALK network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-6cc03e8aa36c.
CVE-2019-17053
ieee802154_create in net/ieee802154/socket.c in the AF_IEEE802154 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-e69dbd4619e7.
CVE-2019-17052
ax25_create in net/ax25/af_ax25.c in the AF_AX25 network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-0614e2b73768.

Copyright 2019, cxsecurity.com

 

Back to Top