The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://downloads.avaya.com/css/P8/documents/100145416 - Third Party Advisory | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html - Mailing List, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2011/03/15/14 - Mailing List, Patch, Third Party Advisory | |
References | () http://openwall.com/lists/oss-security/2011/03/15/9 - Mailing List, Patch, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2011-0833.html - Third Party Advisory | |
References | () http://securityreason.com/securityalert/8189 - Third Party Advisory | |
References | () http://securitytracker.com/id?1025225 - Third Party Advisory, VDB Entry | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.38 - Broken Link | |
References | () http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/517050 - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/46878 - Third Party Advisory, VDB Entry | |
References | () http://www.spinics.net/lists/mm-commits/msg82737.html - Mailing List, Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=688021 - Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2011-04-10 02:51
Updated : 2024-11-21 01:25
NVD link : CVE-2011-1163
Mitre link : CVE-2011-1163
CVE.ORG link : CVE-2011-1163
JSON object : View
Products Affected
redhat
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_aus
linux
- linux_kernel
suse
- linux_enterprise_server
CWE
CWE-20
Improper Input Validation