CVE-2011-4086

MEDIUM
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The journal_unmap_buffer function in fs/jbd2/transaction.c in the Linux kernel before 3.3.1 does not properly handle the _Delay and _Unwritten buffer head states, which allows local users to cause a denial of service (system crash) by leveraging the presence of an ext4 filesystem that was mounted with a journal.

References

http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=15291164b22a357cb211b618adfef4fa82fc0de3

http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html

http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html

http://rhn.redhat.com/errata/RHSA-2012-0571.html

http://rhn.redhat.com/errata/RHSA-2012-0670.html

http://secunia.com/advisories/48898

http://secunia.com/advisories/48964

http://www.debian.org/security/2012/dsa-2469

http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.1

https://bugzilla.redhat.com/show_bug.cgi?id=749143

https://github.com/torvalds/linux/commit/15291164b22a357cb211b618adfef4fa82fc0de3

Details

Source: MITRE

Published: 2012-07-03

Updated: 2017-12-29

Type: CWE-119

Risk Information

CVSS v2

Base Score: 4.9

Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:3.0:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.29:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.30:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.31:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.32:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.33:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.0.34:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.1.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2:rc7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:3.2.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.3 (inclusive)

Tenable Plugins

View all (31 total)

IDNameProductFamilySeverity
79507OracleVM 2.2 : kernel (OVMSA-2013-0039)NessusOracleVM Local Security Checks
high
79283RHEL 5 : rhev-hypervisor5 (RHSA-2012:0168)NessusRed Hat Local Security Checks
high
76644RHEL 6 : MRG (RHSA-2012:0670)NessusRed Hat Local Security Checks
high
74801openSUSE Security Update : kernel (openSUSE-SU-2012:1439-1)NessusSuSE Local Security Checks
critical
74658openSUSE Security Update : Kernel (openSUSE-SU-2012:0799-1)NessusSuSE Local Security Checks
critical
74604openSUSE Security Update : kernel (openSUSE-SU-2012:0540-1)NessusSuSE Local Security Checks
critical
69652Amazon Linux AMI : kernel (ALAS-2012-45)NessusAmazon Linux Local Security Checks
medium
68674Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2012-2014)NessusOracle Linux Local Security Checks
medium
68673Oracle Linux 5 / 6 : Unbreakable Enterprise kernel (ELSA-2012-2013)NessusOracle Linux Local Security Checks
medium
68526Oracle Linux 6 : kernel (ELSA-2012-0571)NessusOracle Linux Local Security Checks
medium
68454Oracle Linux 5 : kernel (ELSA-2012-0107)NessusOracle Linux Local Security Checks
high
64173SuSE 11.1 Security Update : Linux kernel (SAT Patch Numbers 6227 / 6229 / 6230)NessusSuSE Local Security Checks
high
61313Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20120515)NessusScientific Linux Local Security Checks
medium
61241Scientific Linux Security Update : kernel on SL5.x i386/x86_64 (20120209)NessusScientific Linux Local Security Checks
high
59322USN-1458-1 : linux-ti-omap4 vulnerabilitiesNessusUbuntu Local Security Checks
critical
59292Ubuntu 8.04 LTS : linux vulnerability (USN-1454-1)NessusUbuntu Local Security Checks
medium
59291Ubuntu 10.04 LTS : linux-ec2 vulnerabilities (USN-1453-1)NessusUbuntu Local Security Checks
high
59188Ubuntu 10.04 LTS : linux vulnerabilities (USN-1445-1)NessusUbuntu Local Security Checks
high
59165CentOS 6 : kernel (CESA-2012:0571)NessusCentOS Local Security Checks
medium
59106RHEL 6 : kernel (RHSA-2012:0571)NessusRed Hat Local Security Checks
medium
59070Debian DSA-2469-1 : linux-2.6 - privilege escalation/denial of serviceNessusDebian Local Security Checks
high
59034Ubuntu 10.04 LTS : linux-lts-backport-natty vulnerabilities (USN-1440-1)NessusUbuntu Local Security Checks
critical
59032Ubuntu 11.04 : linux vulnerabilities (USN-1432-1)NessusUbuntu Local Security Checks
high
58947Ubuntu 10.04 LTS : linux-lts-backport-oneiric vulnerabilities (USN-1433-1)NessusUbuntu Local Security Checks
critical
58946Ubuntu 11.10 : linux vulnerabilities (USN-1431-1)NessusUbuntu Local Security Checks
critical
58845SuSE 11.2 Security Update : Linux kernel (SAT Patch Numbers 6163 / 6164 / 6172)NessusSuSE Local Security Checks
critical
57922CentOS 5 : kernel (CESA-2012:0107)NessusCentOS Local Security Checks
high
57906Fedora 15 : kernel-2.6.42.3-2.fc15 (2012-1503)NessusFedora Local Security Checks
medium
57905Fedora 16 : kernel-3.2.5-3.fc16 (2012-1497)NessusFedora Local Security Checks
medium
57885RHEL 5 : kernel (RHSA-2012:0107)NessusRed Hat Local Security Checks
high
801512CentOS RHSA-2012-0107 Security CheckLog Correlation EngineGeneric
high