[USN-1227-1] Linux kernel vulnerabilities
Multiple kernel flaws have been fixed.
Ryan Sweat discovered that the kernel incorrectly handled certain VLAN
packets. On some systems, a remote attacker could send specially crafted
traffic to crash the system, leading to a denial of service.
(CVE-2011-1576)
Timo Warns discovered that the EFI GUID partition table was not correctly
parsed. A physically local attacker that could insert mountable devices
could exploit this to crash the system or possibly gain root privileges.
(CVE-2011-1776)
Vasiliy Kulikov and Dan Rosenberg discovered that ecryptfs did not
correctly check the origin of mount points. A local attacker could exploit
this to trick the system into unmounting arbitrary mount points, leading to
a denial of service. (CVE-2011-1833)
Dan Rosenberg discovered that the IPv4 diagnostic routines did not
correctly validate certain requests. A local attacker could exploit this to
consume CPU resources, leading to a denial of service. (CVE-2011-2213)
Dan Rosenberg discovered that the Bluetooth stack incorrectly handled
certain L2CAP requests. If a system was using Bluetooth, a remote attacker
could send specially crafted traffic to crash the system or gain root
privileges. (CVE-2011-2497)
Fernando Gont discovered that the IPv6 stack used predictable fragment
identification numbers. A remote attacker could exploit this to exhaust
network resources, leading to a denial of service. (CVE-2011-2699)
Mauro Carvalho Chehab discovered that the si4713 radio driver did not
correctly check the length of memory copies. If this hardware was
available, a local attacker could exploit this to crash the system or gain
root privileges. (CVE-2011-2700)
Herbert Xu discovered that certain fields were incorrectly handled when
Generic Receive Offload (CVE-2011-2723)
The performance counter subsystem did not correctly handle certain
counters. A local attacker could exploit this to crash the system, leading
to a denial of service. (CVE-2011-2918)
Time Warns discovered that long symlinks were incorrectly handled on Be
filesystems. A local attacker could exploit this with a malformed Be
filesystem and crash the system, leading to a denial of service.
(CVE-2011-2928)
Darren Lavender discovered that the CIFS client incorrectly handled certain
large values. A remote attacker with a malicious server could exploit this
to crash the system or possibly execute arbitrary code as the root user.
(CVE-2011-3191)
Gideon Naim discovered a flaw in the Linux kernel's handling VLAN 0 frames.
An attacker on the local network could exploit this flaw to cause a denial
of service. (CVE-2011-3593)
- ID
- USN-1227-1
- Severity
- high
- Severity from
- CVE-2011-3191
- URL
- https://ubuntu.com/security/notices/USN-1227-1
- Published
-
2011-10-11T12:32:55
(13 years ago) - Modified
-
2011-10-11T12:32:55
(13 years ago) - Other Advisories
-
- ALAS-2011-16
- ALAS-2011-26
- ELSA-2011-0927
- ELSA-2011-1189
- ELSA-2011-1350
- ELSA-2011-1386
- ELSA-2011-1465
- ELSA-2011-2024
- ELSA-2011-2025
- ELSA-2011-2029
- ELSA-2011-2033
- ELSA-2011-2038
- FEDORA-2011-10671
- FEDORA-2011-10718
- FEDORA-2011-10733
- FEDORA-2011-11103
- FEDORA-2011-11936
- FEDORA-2011-11979
- FEDORA-2011-12823
- FEDORA-2011-12874
- FEDORA-2011-13809
- FEDORA-2011-14747
- FEDORA-2011-15241
- FEDORA-2011-15856
- FEDORA-2011-16346
- FEDORA-2011-16621
- FEDORA-2011-9130
- FEDORA-2012-0492
- FEDORA-2012-0861
- FEDORA-2012-1503
- FEDORA-2012-2753
- FEDORA-2012-3356
- FEDORA-2012-3715
- FEDORA-2012-6406
- FEDORA-2012-7594
- FEDORA-2012-8931
- RHSA-2011:1106
- RHSA-2011:1189
- RHSA-2011:1350
- RHSA-2011:1465
- SUSE-SU-2015:0652-1
- USN-1159-1
- USN-1161-1
- USN-1162-1
- USN-1167-1
- USN-1168-1
- USN-1188-1
- USN-1202-1
- USN-1203-1
- USN-1204-1
- USN-1208-1
- USN-1211-1
- USN-1212-1
- USN-1216-1
- USN-1218-1
- USN-1219-1
- USN-1220-1
- USN-1225-1
- USN-1228-1
- USN-1239-1
- USN-1240-1
- USN-1241-1
- USN-1245-1
- USN-1246-1
- USN-1253-1
- USN-1256-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |