Описание
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.1.0-1.0 |
| esm-infra-legacy/trusty | not-affected | 3.11.0-12.19 |
| hardy | released | 2.6.24-31.99 |
| lucid | released | 2.6.32-34.77 |
| maverick | released | 2.6.35-32.64 |
| natty | released | 2.6.38-11.47 |
| oneiric | not-affected | 3.0-0.1 |
| precise | not-affected | 3.1.0-1.1 |
| quantal | not-affected | 3.1.0-1.0 |
| saucy | not-affected |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | not-affected | 3.2.0-1600.1 |
| quantal | not-affected | 3.2.0-1602.5 |
| saucy | DNE | |
| trusty | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.32-318.38 |
| maverick | ignored | end of life |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-1.3 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE | |
| trusty | not-affected | 3.4.0-1.3 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-1.3] |
| upstream | released | 3.0~rc1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.31-612.33 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-1.7 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-1.7 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-1.7] |
| upstream | released | 3.0~rc1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.1.10-8.28 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.1.10-8.28 |
| trusty/esm | DNE | trusty was not-affected [3.1.10-8.28] |
| upstream | released | 3.0~rc1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.35-32.64~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.38-11.49~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | not-affected | 3.0.0-5.6~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.0.0-3.18 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.0.0-3.18 |
| trusty/esm | DNE | trusty was not-affected [3.0.0-3.18] |
| upstream | released | 3.0~rc1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-3.21 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-3.21 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-3.21] |
| upstream | released | 3.0~rc1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-4.19 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-4.19 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-4.19] |
| upstream | released | 3.0~rc1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.32-218.35 |
| maverick | released | 2.6.32-418.35 |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| maverick | released | 2.6.35-903.31 |
| natty | released | 2.6.38-1209.22 |
| oneiric | not-affected | 3.0.0-1200.1 |
| precise | not-affected | 3.0.0-1401.2 |
| quantal | not-affected | 3.0.0-1401.2 |
| saucy | not-affected |
Показывать по
Ссылки на источники
EPSS
7.2 High
CVSS2
Связанные уязвимости
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel b ...
The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить доступность защищаемой информации
EPSS
7.2 High
CVSS2