CVE Vulnerabilities

CVE-2011-2695

Off-by-one Error

Published: Jul 28, 2011 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
4.9 MEDIUM
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V2
4.9 MODERATE
AV:L/AC:L/Au:N/C:N/I:N/A:C
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Multiple off-by-one errors in the ext4 subsystem in the Linux kernel before 3.0-rc5 allow local users to cause a denial of service (BUG_ON and system crash) by accessing a sparse file in extent format with a write operation involving a block number corresponding to the largest possible 32-bit unsigned integer.

Weakness

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*3.0 (excluding)
Linux_kernelLinux3.0 (including)3.0 (including)
Linux_kernelLinux3.0-rc1 (including)3.0-rc1 (including)
Linux_kernelLinux3.0-rc2 (including)3.0-rc2 (including)
Linux_kernelLinux3.0-rc3 (including)3.0-rc3 (including)
Linux_kernelLinux3.0-rc4 (including)3.0-rc4 (including)
Red Hat Enterprise Linux 5RedHatkernel-0:2.6.18-274.7.1.el5*
Red Hat Enterprise Linux 6RedHatkernel-0:2.6.32-131.12.1.el6*
Red Hat Enterprise MRG 2RedHatkernel-rt-0:2.6.33.9-rt31.75.el6rt*
LinuxUbuntulucid*
LinuxUbuntumaverick*
LinuxUbuntunatty*
LinuxUbuntuupstream*
Linux-ec2Ubuntulucid*
Linux-ec2Ubuntumaverick*
Linux-ec2Ubuntuupstream*
Linux-floUbuntuupstream*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-goldfishUbuntusaucy*
Linux-goldfishUbuntuupstream*
Linux-grouperUbuntusaucy*
Linux-grouperUbuntuupstream*
Linux-lts-backport-maverickUbuntulucid*
Linux-lts-backport-maverickUbuntuupstream*
Linux-lts-backport-nattyUbuntulucid*
Linux-lts-backport-nattyUbuntuupstream*
Linux-lts-backport-oneiricUbuntuupstream*
Linux-maguroUbuntusaucy*
Linux-maguroUbuntuupstream*
Linux-makoUbuntusaucy*
Linux-makoUbuntuupstream*
Linux-mantaUbuntusaucy*
Linux-mantaUbuntuupstream*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntumaverick*
Linux-mvl-doveUbuntuupstream*
Linux-ti-omap4Ubuntumaverick*
Linux-ti-omap4Ubuntunatty*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References