CVE-2011-2695
kernel: ext4: kernel panic when writing data to the last block of sparse file
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before 3.0-rc5 allow local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corresponding to the largest possible 32-bit unsigned integer.
Múltiples errores off-by-one en el subsistema de ext4 en el kernel de Linux antes de v3.0-rc5, permite a usuarios locales provocar una denegación de servicio (BUG_ON y caída del sistema) por acceder a un archivo disperso en el formato de medida con una operación de escritura con un número de bloque correspondiente al mayor número posible de un entero de 32 bits sin signo.
Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. Using PCI passthrough without interrupt remapping support allowed KVM guests to generate MSI interrupts and thus potentially inject traps. A privileged guest user could use this flaw to crash the host or possibly escalate their privileges on the host. The fix for this issue can prevent PCI passthrough working and guests starting. Flaw in the client-side NLM implementation could allow a local, unprivileged user to cause a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-07-11 CVE Reserved
- 2011-07-28 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-193: Off-by-one Error
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f17722f917b2f21497deb6edc62fb1683daa08e6 | X_refsource_confirm | |
http://secunia.com/advisories/45193 | Third Party Advisory | |
http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc5 | Broken Link | |
http://www.openwall.com/lists/oss-security/2011/07/15/7 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2011/07/15/8 | Mailing List |
|
URL | Date | SRC |
---|---|---|
http://www.spinics.net/lists/linux-ext4/msg25697.html | 2024-08-06 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=722557 | 2011-10-20 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2011-2695 | 2011-10-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.0 Search vendor "Linux" for product "Linux Kernel" and version " < 3.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.0 Search vendor "Linux" for product "Linux Kernel" and version "3.0" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.0 Search vendor "Linux" for product "Linux Kernel" and version "3.0" | rc1 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.0 Search vendor "Linux" for product "Linux Kernel" and version "3.0" | rc2 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.0 Search vendor "Linux" for product "Linux Kernel" and version "3.0" | rc3 |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.0 Search vendor "Linux" for product "Linux Kernel" and version "3.0" | rc4 |
Affected
|