Vulnerability CVE-2011-2928


Published: 2011-08-29   Modified: 2012-02-13

Description:
The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Linux kernel: ZERO_SIZE_PTR dereference for long symlinks in Be FS
Timo Warns
01.09.2011

Type:

CWE-20

(Improper Input Validation)

Vendor: Linux
Product: Linux kernel 
Version:
3.1
3.0.4
3.0.3
3.0.2
3.0.1
3.0
2.6.9
2.6.8.1
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.39.3
2.6.39.2
2.6.39.1
2.6.39
2.6.38.8
2.6.38.7
2.6.38.6
2.6.38.5
2.6.38.4
2.6.38.3
2.6.38.2
2.6.38.1
2.6.38
2.6.37.6
2.6.37.5
2.6.37.4
2.6.37.3
2.6.37.2
2.6.37.1
2.6.37
2.6.36.4
2.6.36.3
2.6.36.2
2.6.36.1
2.6.36
2.6.35.9
2.6.35.8
2.6.35.7
2.6.35.6
2.6.35.5
2.6.35.4
2.6.35.3
2.6.35.2
2.6.35.1
2.6.35
2.6.34.7
2.6.34.6
See more versions on NVD
Product: Kernel 
Version:
3.1
3.0.4
3.0.3
3.0.2
3.0.1
3.0
2.6.9
2.6.8.1
2.6.8
2.6.7
2.6.6
2.6.5
2.6.4
2.6.39.3
2.6.39.2
2.6.39.1
2.6.39
2.6.38.8
2.6.38.7
2.6.38.6
2.6.38.5
2.6.38.4
2.6.38.3
2.6.38.2
2.6.38.1
2.6.38
2.6.37.6
2.6.37.5
2.6.37.4
2.6.37.3
2.6.37.2
2.6.37.1
2.6.37
2.6.36.4
2.6.36.3
2.6.36.2
2.6.36.1
2.6.36
2.6.35.9
2.6.35.8
2.6.35.7
2.6.35.6
2.6.35.5
2.6.35.4
2.6.35.3
2.6.35.2
2.6.35.1
2.6.35
2.6.34.7
2.6.34.6
See more versions on NVD

CVSS2 => (AV:L/AC:L/Au:N/C:N/I:N/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.9/10
6.9/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Complete

 References:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=338d0f0a6fbc82407864606f5b64b75aeb3c70f2
http://securityreason.com/securityalert/8360
http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.1-rc3
http://www.openwall.com/lists/oss-security/2011/08/19/1
http://www.openwall.com/lists/oss-security/2011/08/19/5
http://www.pre-cert.de/advisories/PRE-SA-2011-06.txt
http://www.securityfocus.com/archive/1/519387/100/0/threaded
http://www.securityfocus.com/bid/49256
https://exchange.xforce.ibmcloud.com/vulnerabilities/69343

Related CVE
CVE-2019-14821
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wher...
CVE-2019-16413
An issue was discovered in the Linux kernel before 5.0.4. The 9p filesystem did not protect i_size_write() properly, which causes an i_size_read() infinite loop and denial of service on SMP systems.
CVE-2019-14835
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descript...
CVE-2019-15031
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instr...
CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transa...
CVE-2019-16234
drivers/net/wireless/intel/iwlwifi/pcie/trans.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
CVE-2019-16233
drivers/scsi/qla2xxx/qla_os.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.
CVE-2019-16232
drivers/net/wireless/marvell/libertas/if_sdio.c in the Linux kernel 5.2.14 does not check the alloc_workqueue return value, leading to a NULL pointer dereference.

Copyright 2019, cxsecurity.com

 

Back to Top