Upstream information

CVE-2011-2479 at MITRE

Description

The Linux kernel before 2.6.39 does not properly create transparent huge pages in response to a MAP_PRIVATE mmap system call on /dev/zero, which allows local users to cause a denial of service (system crash) via a crafted application.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.9
Vector AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
CVSS v3 Scores
  National Vulnerability Database
Base Score 5.5
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
CVSSv3 Version 3.1

Note from the SUSE Security Team

This issue only affects kernels after 2.6.37, so SUSE Linux Enterprise 10 or older products are not affected. SUSE Linux Enterprise 11 GA or SP1 are also not affected. SUSE Linux Enterprise 11 SP2 received a fix during its development phase and so is also not affected. Newer products are not affected by this problem.

Note from the SUSE Security Team on the kernel-default package

SUSE will no longer fix all CVEs in the Linux Kernel anymore, but declare some bug classes as won't fix. Please refer to TID 21496 for more details.

SUSE Bugzilla entry: 701163 [RESOLVED / UPSTREAM]

SUSE Security Advisories:

    openSUSE-SU-2013:0927-1

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP4
SUSE Linux Enterprise Server for SAP Applications 11 SP4
SUSE Linux Enterprise Software Development Kit 11 SP4
  • kernel-docs >= 3.0.101-63.1
Patchnames:
SUSE Linux Enterprise Software Development Kit 11 SP4 GA kernel-docs-3.0.101-63.1
SUSE Linux Enterprise Server 11 SP2
  • kernel-default >= 3.0.13-0.27.1
  • kernel-default-base >= 3.0.13-0.27.1
  • kernel-default-devel >= 3.0.13-0.27.1
  • kernel-default-man >= 3.0.13-0.27.1
  • kernel-pae >= 3.0.13-0.27.1
  • kernel-pae-base >= 3.0.13-0.27.1
  • kernel-pae-devel >= 3.0.13-0.27.1
  • kernel-ppc64 >= 3.0.13-0.27.1
  • kernel-ppc64-base >= 3.0.13-0.27.1
  • kernel-ppc64-devel >= 3.0.13-0.27.1
  • kernel-source >= 3.0.13-0.27.1
  • kernel-syms >= 3.0.13-0.27.1
  • kernel-trace >= 3.0.13-0.27.1
  • kernel-trace-base >= 3.0.13-0.27.1
  • kernel-trace-devel >= 3.0.13-0.27.1
  • kernel-xen >= 3.0.13-0.27.1
  • kernel-xen-base >= 3.0.13-0.27.1
  • kernel-xen-devel >= 3.0.13-0.27.1
Patchnames:
SUSE Linux Enterprise Server 11 SP2 GA kernel-default-3.0.13-0.27.1
SUSE Linux Enterprise Server 11 SP3
  • kernel-default >= 3.0.76-0.11.1
  • kernel-default-base >= 3.0.76-0.11.1
  • kernel-default-devel >= 3.0.76-0.11.1
  • kernel-default-man >= 3.0.76-0.11.1
  • kernel-pae >= 3.0.76-0.11.1
  • kernel-pae-base >= 3.0.76-0.11.1
  • kernel-pae-devel >= 3.0.76-0.11.1
  • kernel-ppc64 >= 3.0.76-0.11.1
  • kernel-ppc64-base >= 3.0.76-0.11.1
  • kernel-ppc64-devel >= 3.0.76-0.11.1
  • kernel-source >= 3.0.76-0.11.1
  • kernel-syms >= 3.0.76-0.11.1
  • kernel-trace >= 3.0.76-0.11.1
  • kernel-trace-base >= 3.0.76-0.11.1
  • kernel-trace-devel >= 3.0.76-0.11.1
  • kernel-xen >= 3.0.76-0.11.1
  • kernel-xen-base >= 3.0.76-0.11.1
  • kernel-xen-devel >= 3.0.76-0.11.1
Patchnames:
SUSE Linux Enterprise Server 11 SP3 GA kernel-default-3.0.76-0.11.1
SUSE Linux Enterprise Server 11 SP4
  • kernel-default >= 3.0.101-63.1
  • kernel-default-base >= 3.0.101-63.1
  • kernel-default-devel >= 3.0.101-63.1
  • kernel-default-man >= 3.0.101-63.1
  • kernel-docs >= 3.0.101-63.1
  • kernel-pae >= 3.0.101-63.1
  • kernel-pae-base >= 3.0.101-63.1
  • kernel-pae-devel >= 3.0.101-63.1
  • kernel-ppc64 >= 3.0.101-63.1
  • kernel-ppc64-base >= 3.0.101-63.1
  • kernel-ppc64-devel >= 3.0.101-63.1
  • kernel-source >= 3.0.101-63.1
  • kernel-syms >= 3.0.101-63.1
  • kernel-trace >= 3.0.101-63.1
  • kernel-trace-base >= 3.0.101-63.1
  • kernel-trace-devel >= 3.0.101-63.1
  • kernel-xen >= 3.0.101-63.1
  • kernel-xen-base >= 3.0.101-63.1
  • kernel-xen-devel >= 3.0.101-63.1
Patchnames:
SUSE Linux Enterprise Server 11 SP4 GA kernel-default-3.0.101-63.1
SUSE Linux Enterprise Software Development Kit 11 SP4 GA kernel-docs-3.0.101-63.1


SUSE Timeline for this CVE

CVE page created: Tue Jul 9 19:11:55 2013
CVE page last modified: Tue Jul 16 11:13:49 2024