CVE-2011-2689

The gfs2_fallocate function in fs/gfs2/file.c in the Linux kernel before 3.0-rc1 does not ensure that the size of a chunk allocation is a multiple of the block size, which allows local users to cause a denial of service (BUG and system crash) by arranging for all resource groups to have too little free space.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2011-1065.html Third Party Advisory
http://secunia.com/advisories/45193 Third Party Advisory
http://securitytracker.com/id?1025776 Third Party Advisory VDB Entry
http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1 Broken Link
http://www.openwall.com/lists/oss-security/2011/07/13/1 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/48677 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=720861 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/68557 Third Party Advisory VDB Entry
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2011-1065.html Third Party Advisory
http://secunia.com/advisories/45193 Third Party Advisory
http://securitytracker.com/id?1025776 Third Party Advisory VDB Entry
http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1 Broken Link
http://www.openwall.com/lists/oss-security/2011/07/13/1 Mailing List Patch Third Party Advisory
http://www.securityfocus.com/bid/48677 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=720861 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/68557 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63 -
References () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2011-1065.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2011-1065.html - Third Party Advisory
References () http://secunia.com/advisories/45193 - Third Party Advisory () http://secunia.com/advisories/45193 - Third Party Advisory
References () http://securitytracker.com/id?1025776 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1025776 - Third Party Advisory, VDB Entry
References () http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1 - Broken Link () http://www.kernel.org/pub/linux/kernel/v3.0/testing/ChangeLog-3.0-rc1 - Broken Link
References () http://www.openwall.com/lists/oss-security/2011/07/13/1 - Mailing List, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2011/07/13/1 - Mailing List, Patch, Third Party Advisory
References () http://www.securityfocus.com/bid/48677 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/48677 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=720861 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=720861 - Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68557 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/68557 - Third Party Advisory, VDB Entry

Information

Published : 2011-07-28 22:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2689

Mitre link : CVE-2011-2689

CVE.ORG link : CVE-2011-2689


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_linux_workstation
  • enterprise_linux_desktop
  • enterprise_linux_server
CWE
CWE-400

Uncontrolled Resource Consumption