CVE-2011-1759
Publication date 2 May 2011
Last updated 24 July 2024
Ubuntu priority
Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging a race condition.
From the Ubuntu Security Team
Dan Rosenberg reported an error in the old ABI compatibility layer of ARM kernels. A local attacker could exploit this flaw to cause a denial of service or gain root privileges.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-lts-backport-maverick | ||
linux-lts-backport-natty | ||
linux-lts-backport-oneiric | ||
linux-mvl-dove | ||
linux-ti-omap4 | ||
References
Related Ubuntu Security Notices (USN)
- USN-1341-1
- Linux kernel vulnerabilities
- 23 January 2012
- USN-1332-1
- Linux kernel (Maverick backport) vulnerabilities
- 13 January 2012
- USN-1383-1
- Linux kernel (OMAP4) vulnerabilities
- 6 March 2012
- USN-1168-1
- Linux kernel vulnerabilities
- 15 July 2011
- USN-1162-1
- Linux kernel vulnerabilities (Marvell Dove)
- 29 June 2011
- USN-1167-1
- Linux kernel vulnerabilities
- 13 July 2011
- USN-1394-1
- linux-ti-omap4 vulnerabilities
- 7 March 2012
- USN-1161-1
- Linux kernel vulnerabilities (EC2)
- 13 July 2011
- USN-1159-1
- Linux kernel vulnerabilities (Marvell Dove)
- 13 July 2011