CVE-2011-2695

Priority
Description
Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before
3.0-rc5 allow local users to cause a denial of service (BUG_ON and system
crash) by accessing a sparse file in extent format with a write operation
involving a block number corresponding to the largest possible 32-bit
unsigned integer.
Ubuntu-Description
It was discovered that the EXT4 filesystem contained multiple off-by-one
flaws. A local attacker could exploit this to crash the system, leading to
a denial of service.
Notes
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (3.11.0-12.19)
Patches:
Introduced by
a86c61812637c7dd0c57e29880cffd477b62f2e7
Fixed by
f17722f917b2f21497deb6edc62fb1683daa08e6
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-1.3])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-1.7])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.1.10-8.28])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.0.0-3.18])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-3.21])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-4.19])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
More Information

Updated: 2020-01-29 19:41:42 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)