7.2
CVSSv2

CVE-2011-1017

Published: 01/03/2011 Updated: 07/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and previous versions might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 8.04

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-2524 David Howells reported an issue in the Common Internet File System (CIFS) Local users could cause ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple flaws fixed in the Linux kernel ...
Multiple kernel vulnerabilities have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple flaws fixed in the Linux kernel ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...
Multiple kernel flaws have been fixed ...

Exploits

Ubuntu Security Notice 1202-1 - Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly A local user could exploit this to read kernel stack memory, leading to a loss of privacy Brad Spengler discovered that stack memory for new a process was not correctly calculated A local attacker could exploit this to crash ...

Github Repositories

Demo showing how to use the vulnerability module

Demo Puppet vulnerability management We will show you how you can integrate vulnerability scanning and remediation into your Puppet workflow in this demo You can use this demo with Puppet Enterprise or start the nodes masterless to view how it works quickly Scanning vulnerabilities After starting the modes (see following paragraphs), you can log in to the system: $ vagrant ss