CVE-2011-1017
Ubuntu Security Notice USN-1111-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.
Desbordamiento de búfer en memoria dinámica en la función ldm_frag_add en fs/partitions/ldm.c en el kernel de Linux v2.6.37.2 y anteriores, podría permitir a usuarios locales conseguir privilegios u obtener información sensible a través de una tabla de particiones LDM manipulada.
Multiple vulnerabilities have been addressed in the Linux 2.6 kernel. Dan Rosenberg discovered multiple flaws in the X.25 facilities parsing. Vegard Nossum discovered that memory garbage collection was not handled correctly for active sockets. Nelson Elhage discovered that the kernel did not correctly handle process cleanup after triggering a recoverable kernel bug. Nelson Elhage discovered that Econet did not correctly handle AUN packets over UDP. Dan Rosenberg discovered that the OSS subsystem did not handle name termination correctly. Dan Rosenberg discovered that IRDA did not correctly check the size of buffers. Dan Carpenter discovered that the TTPCI DVB driver did not check certain values during an ioctl. Jens Kuehnel discovered that the InfiniBand driver contained a race condition. Timo Warns discovered that the LDM disk partition handling code did not correctly handle certain values.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-02-14 CVE Reserved
- 2011-03-01 CVE Published
- 2011-09-14 First Exploit
- 2024-08-06 CVE Updated
- 2025-04-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-787: Out-of-bounds Write
CAPEC
References (12)
URL | Tag | Source |
---|---|---|
http://openwall.com/lists/oss-security/2011/02/23/16 | Mailing List | |
http://secunia.com/advisories/43716 | Third Party Advisory | |
http://secunia.com/advisories/43738 | Third Party Advisory | |
http://securityreason.com/securityalert/8115 | Third Party Advisory | |
http://securitytracker.com/id?1025128 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/516615/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/46512 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/105078 | 2011-09-14 | |
http://openwall.com/lists/oss-security/2011/02/24/14 | 2024-08-06 | |
http://openwall.com/lists/oss-security/2011/02/24/4 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://www.pre-cert.de/advisories/PRE-SA-2011-01.txt | 2020-08-07 |
URL | Date | SRC |
---|---|---|
http://www.ubuntu.com/usn/USN-1146-1 | 2020-08-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.37.2 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.37.2" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 8.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04" | - |
Affected
|