~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2011-1180

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2011-07-25
2
 
Candidate: CVE-2011-1180
3
 
PublicDate: 2013-06-08
4
 
References: 
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180
6
 
 https://usn.ubuntu.com/usn/usn-1187-1
7
 
 https://usn.ubuntu.com/usn/usn-1189-1
8
 
 https://usn.ubuntu.com/usn/usn-1202-1
9
 
 https://usn.ubuntu.com/usn/usn-1204-1
10
 
 https://usn.ubuntu.com/usn/usn-1167-1
11
 
 https://usn.ubuntu.com/usn/usn-1160-1
12
 
 https://usn.ubuntu.com/usn/usn-1141-1
13
 
 https://usn.ubuntu.com/usn/usn-1162-1
14
 
 https://usn.ubuntu.com/usn/usn-1159-1
15
 
 https://usn.ubuntu.com/usn/usn-1212-1
16
 
 https://usn.ubuntu.com/usn/usn-1256-1
17
 
Description:
18
 
 Multiple stack-based buffer overflows in the
19
 
 iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux
20
 
 kernel before 2.6.39 allow remote attackers to cause a denial of service
21
 
 (memory corruption) or possibly have unspecified other impact by leveraging
22
 
 connectivity to an IrDA infrared network and sending a large integer value
23
 
 for a (1) name length or (2) attribute length.
24
 
Ubuntu-Description: 
25
 
 Dan Rosenberg discovered that the IRDA subsystem did not correctly check
26
 
 certain field sizes. If a system was using IRDA, a remote attacker could
27
 
 send specially crafted traffic to crash the system or gain root privileges.
28
 
Notes: 
29
 
Bugs:
30
 
 https://launchpad.net/bugs/816547
31
 
Priority: low
32
 
Discovered-by: Dan Rosenberg
33
 
Assigned-to: 
34
 
 
35
 
Tags_linux_lucid: stack-protector
36
 
Tags_linux_maverick: stack-protector
37
 
Tags_linux_natty: stack-protector
38
 
Patches_linux:
39
 
 break-fix: - d370af0ef7951188daeb15bae75db7ba57c67846
40
 
upstream_linux: released (2.6.39~rc1)
41
 
hardy_linux: released (2.6.24-29.93)
42
 
lucid_linux: released (2.6.32-32.62)
43
 
maverick_linux: released (2.6.35-30.52)
44
 
natty_linux: released (2.6.38-9.43)
45
 
oneiric_linux: not-affected (2.6.39-0.1)
46
 
devel_linux: not-affected (2.6.39-0.1)
47
 
 
48
 
Tags_linux-ec2: stack-protector
49
 
Patches_linux-ec2:
50
 
upstream_linux-ec2: released (2.6.39~rc1)
51
 
hardy_linux-ec2: DNE
52
 
lucid_linux-ec2: released (2.6.32-316.30)
53
 
maverick_linux-ec2: ignored (binary supplied by "linux" now)
54
 
natty_linux-ec2: DNE
55
 
oneiric_linux-ec2: DNE
56
 
devel_linux-ec2: DNE
57
 
 
58
 
Tags_linux-mvl-dove: stack-protector
59
 
Patches_linux-mvl-dove:
60
 
upstream_linux-mvl-dove: released (2.6.39~rc1)
61
 
hardy_linux-mvl-dove: DNE
62
 
lucid_linux-mvl-dove: released (2.6.32-217.34)
63
 
maverick_linux-mvl-dove: released (2.6.32-417.34)
64
 
natty_linux-mvl-dove: DNE
65
 
oneiric_linux-mvl-dove: DNE
66
 
devel_linux-mvl-dove: DNE
67
 
 
68
 
Tags_linux-ti-omap4: stack-protector
69
 
Patches_linux-ti-omap4:
70
 
upstream_linux-ti-omap4: released (2.6.39~rc1)
71
 
hardy_linux-ti-omap4: DNE
72
 
lucid_linux-ti-omap4: DNE
73
 
maverick_linux-ti-omap4: released (2.6.35-903.23)
74
 
natty_linux-ti-omap4: released (2.6.38-1209.13)
75
 
oneiric_linux-ti-omap4: not-affected (2.6.38-1309.13)
76
 
devel_linux-ti-omap4: not-affected (2.6.38-1309.13)
77
 
 
78
 
Tags_linux-lts-backport-maverick: stack-protector
79
 
Patches_linux-lts-backport-maverick:
80
 
upstream_linux-lts-backport-maverick: released (2.6.39~rc1)
81
 
hardy_linux-lts-backport-maverick: DNE
82
 
lucid_linux-lts-backport-maverick: released (2.6.35-30.54~lucid1)
83
 
maverick_linux-lts-backport-maverick: DNE
84
 
natty_linux-lts-backport-maverick: DNE
85
 
oneiric_linux-lts-backport-maverick: DNE
86
 
devel_linux-lts-backport-maverick: DNE
87
 
 
88
 
Tags_linux-fsl-imx51: stack-protector
89
 
Patches_linux-fsl-imx51:
90
 
upstream_linux-fsl-imx51: released (2.6.39~rc1)
91
 
hardy_linux-fsl-imx51: DNE
92
 
lucid_linux-fsl-imx51: released (2.6.31-610.27)
93
 
maverick_linux-fsl-imx51: DNE
94
 
natty_linux-fsl-imx51: DNE
95
 
oneiric_linux-fsl-imx51: DNE
96
 
devel_linux-fsl-imx51: DNE
97
 
 
98
 
Tags_linux-lts-backport-natty: stack-protector
99
 
Patches_linux-lts-backport-natty:
100
 
upstream_linux-lts-backport-natty: released (2.6.39~rc1)
101
 
hardy_linux-lts-backport-natty: DNE
102
 
lucid_linux-lts-backport-natty: released (2.6.38-9.43~lucid1)
103
 
maverick_linux-lts-backport-natty: DNE
104
 
natty_linux-lts-backport-natty: DNE
105
 
oneiric_linux-lts-backport-natty: DNE
106
 
devel_linux-lts-backport-natty: DNE
107
 
 
108
 
Patches_linux-lts-backport-oneiric:
109
 
upstream_linux-lts-backport-oneiric: released (2.6.39~rc1)
110
 
hardy_linux-lts-backport-oneiric: DNE
111
 
lucid_linux-lts-backport-oneiric: not-affected
112
 
maverick_linux-lts-backport-oneiric: DNE
113
 
natty_linux-lts-backport-oneiric: DNE
114
 
oneiric_linux-lts-backport-oneiric: DNE
115
 
devel_linux-lts-backport-oneiric: DNE