CVE-2011-1495

Priority
Description
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier
does not validate (1) length and (2) offset values before performing memory
copy operations, which might allow local users to gain privileges, cause a
denial of service (memory corruption), or obtain sensitive information from
kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command
and _ctl_diag_read_buffer functions.
Ubuntu-Description
Dan Rosenberg discovered that MPT devices did not correctly validate
certain values in ioctl calls. If these drivers were loaded, a local
attacker could exploit this to read arbitrary kernel memory, leading to a
loss of privacy.
Notes
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (2.6.39~rc6)
Patches:
Upstream:http://git.kernel.org/linus/a1f74ae82d133ebb2aabb19d181944b4e83e9960
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
Package
Upstream:released (2.6.39~rc6)
More Information

Updated: 2019-12-05 20:56:57 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)