SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information
SecurityTracker Alert ID:  1025225
SecurityTracker URL:  http://securitytracker.com/id/1025225
CVE Reference:   CVE-2011-1163   (Links to External Site)
Date:  Mar 17 2011
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.4.x, 2.6.x
Description:   A vulnerability was reported in the Linux Kernel. A local user can obtain information from kernel memory.

A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to userspace.

Timo Warns (PRESENSE Technologies GmbH) reported this vulnerability.

Impact:   A local user can obtain kernel memory contents.
Solution:   The vendor has issued a fix (2.6.38).
Vendor URL:  www.kernel.org/ (Links to External Site)
Cause:   Boundary error

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 10 2011 (Red Hat Issues Fix) Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information
Red Hat has issued a fix for Red Hat Enterprise MRG 1.3 for RHEL 5.
May 19 2011 (Red Hat Issues Fix) Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Jun 22 2011 (Red Hat Issues Fix) Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information
Red Hat has issued a fix for Red Hat Enterprise Linux 6.0.



 Source Message Contents

Subject:  [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel

PRE-CERT Security Advisory
==========================

* Advisory: PRE-SA-2011-02 
* Released on: 16 Mar 2011
* Last updated on: 16 Mar 2011
* Affected product: Linux Kernel 2.4 and 2.6
* Impact: disclosure of sensitive information
* Origin: storage devices
* Credit: Timo Warns (PRESENSE Technologies GmbH)
* CVE Identifier: CVE-2011-1163


Summary
-------

The Linux kernel contains a vulnerability that may lead to information
leakage due to corrupted partition tables.

The kernel automatically evaluates partition tables of storage devices.
This happens independently of whether any auto-mounting is enabled or
not. The code for evaluating OSF partition tables contains a buffer
overflow bug that allows to leak data from the kernel heap to userspace.


Workaround
----------

Compile and use a kernel that does not evaluate OSF partition tables.
The corresponding configuration key is CONFIG_OSF_PARTITION.


Solution
--------

The bug has been fixed in Linux kernel 2.6.38.


References
----------

When further information becomes available, this advisory will be
updated. The most recent version of this advisory is available at:

http://www.pre-cert.de/advisories/PRE-SA-2011-02.txt


Contact
-------

PRE-CERT can be reached under precert@pre-secure.de. For PGP key
information, refer to http://www.pre-cert.de/.
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC