Oval Definition:oval:com.ubuntu.trusty:def:20112182000
Revision Date:2012-06-13Version:1
Title:CVE-2011-2182 on Ubuntu 14.04 LTS (trusty) - medium.
Description:The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017. Ben Hutchings reported a flaw in the kernel's handling of corrupt LDM partitions. A local user could exploit this to cause a denial of service or escalate privileges.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2011-2182
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in trusty is not affected (note: '3.11.0-12.19').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in trusty is not affected (note: '3.4.0-1.3').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in trusty is not affected (note: '3.4.0-1.7').
  • OR NOT While related to the CVE in some way, the 'linux-grouper' package in trusty is not affected (note: '3.1.10-8.28').
  • OR NOT While related to the CVE in some way, the 'linux-maguro' package in trusty is not affected (note: '3.0.0-3.18').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in trusty is not affected (note: '3.4.0-3.21').
  • OR NOT While related to the CVE in some way, the 'linux-manta' package in trusty is not affected (note: '3.4.0-4.19').
  • BACK