Vulnerability CVE-2011-1012


Published: 2011-03-01   Modified: 2012-02-13

Description:
The ldm_parse_vmdb function in fs/partitions/ldm.c in the Linux kernel before 2.6.38-rc6-git6 does not validate the VBLK size value in the VMDB structure in an LDM partition table, which allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted partition table.

See advisories in our WLB2 database:
Topic
Author
Date
High
Linux Kernel Buffer Overflow ldm_frag_add() Elevated Privileges
PRE
04.03.2011

Type:

CWE-20

(Improper Input Validation)

Vendor: Linux
Product: Kernel 
Version:
2.6.9
2.6.8.1
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.38
2.6.37.6
2.6.37.5
2.6.37.4
2.6.37.3
2.6.37.2
2.6.37.1
2.6.37
2.6.36.2
2.6.36.1
2.6.36
2.6.35.8
2.6.35.7
2.6.35.6
2.6.35.5
2.6.35.4
2.6.35.3
2.6.35.2
2.6.35.1
2.6.35
2.6.34.7
2.6.34.6
2.6.34.5
2.6.34.4
2.6.34.3
2.6.34.2
2.6.34.1
2.6.34
2.6.33.7
2.6.33.6
2.6.33.5
2.6.33.4
2.6.33.3
2.6.33.2
2.6.33.1
2.6.33
2.6.32.9
2.6.32.8
2.6.32.7
2.6.32.6
2.6.32.5
2.6.32.4
2.6.32.3
See more versions on NVD
Product: Linux kernel 
Version:
2.6.9
2.6.8.1
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.38
2.6.37.6
2.6.37.5
2.6.37.4
2.6.37.3
2.6.37.2
2.6.37.1
2.6.37
2.6.36.2
2.6.36.1
2.6.36
2.6.35.8
2.6.35.7
2.6.35.6
2.6.35.5
2.6.35.4
2.6.35.3
2.6.35.2
2.6.35.1
2.6.35
2.6.34.7
2.6.34.6
2.6.34.5
2.6.34.4
2.6.34.3
2.6.34.2
2.6.34.1
2.6.34
2.6.33.7
2.6.33.6
2.6.33.5
2.6.33.4
2.6.33.3
2.6.33.2
2.6.33.1
2.6.33
2.6.32.9
2.6.32.8
2.6.32.7
2.6.32.6
2.6.32.5
2.6.32.4
2.6.32.3
See more versions on NVD

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.9/10
6.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete

 References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=294f6cf48666825d23c9372ef37631232746e40d
http://openwall.com/lists/oss-security/2011/02/23/21
http://openwall.com/lists/oss-security/2011/02/23/4
http://securityreason.com/securityalert/8115
http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.38-rc6-git6.log
http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt
http://www.securityfocus.com/archive/1/516615/100/0/threaded
http://www.securityfocus.com/bid/46512
http://www.securitytracker.com/id?1025127
http://www.spinics.net/lists/mm-commits/msg82429.html
http://www.ubuntu.com/usn/USN-1146-1

Related CVE
CVE-2019-10639
The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the...
CVE-2019-10638
In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to ...
CVE-2019-13233
In arch/x86/lib/insn-eval.c in the Linux kernel before 5.1.9, there is a use-after-free for access to an LDT entry because of a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.
CVE-2019-12984
A NULL pointer dereference vulnerability in the function nfc_genl_deactivate_target() in net/nfc/netlink.c in the Linux kernel before 5.1.13 can be triggered by a malicious user-mode program that omits certain NFC attributes, leading to denial of ser...
CVE-2019-12817
arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of pow...
CVE-2019-3896
A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).
CVE-2019-11479
Jonathan Looney discovered that the Linux kernel default MSS is hard-coded to 48 bytes. This allows a remote peer to fragment TCP resend queues significantly more than if a larger MSS were enforced. A remote attacker could use this to cause a denial ...
CVE-2019-11478
Jonathan Looney discovered that the TCP retransmission queue implementation in tcp_fragment in the Linux kernel could be fragmented when handling certain TCP Selective Acknowledgment (SACK) sequences. A remote attacker could use this to cause a denia...

Copyright 2019, cxsecurity.com

 

Back to Top