CVE-2011-2491

Priority
Medium
Description
The Network Lock Manager (NLM) protocol implementation in the NFS client
functionality in the Linux kernel before 3.0 allows local users to cause a
denial of service (system hang) via a LOCK_UN flock system call.
Ubuntu-Description
Vasily Averin discovered that the NFS Lock Manager (NLM) incorrectly
handled unlock requests. A local attacker could exploit this to cause a
denial of service.
References
Bugs
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.11.0-12.19)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.2.0-16.19)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2Fixed by 0b760113a3a155269a3fba93a409c640031dd68f
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.4.0-1.9)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (3.4.0-4.23)
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.0.0-3.18)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.4.0-4.19)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (3.4.0-6.29)
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.1.10-8.28)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.19.0-18.18~14.04.1)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (4.2.0-1014.21)
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.4.0-3.21)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (3.4.0-5.34)
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.16.0-25.33~14.04.2)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 LTS (Trusty Tahr):not-affected (3.4.0-1.3)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (3.4.0-3.15)
More Information

Updated: 2017-10-18 19:14:46 UTC (commit 13547)