Multiple vulnerabilities in Linux kernel



| Updated: 2020-08-11
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2012-1090
CVE-2012-1097
CVE-2012-1146
CWE-ID CWE-20
CWE-476
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Input validation error

EUVDB-ID: #VU44068

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2012-1090

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.

The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 3.2.1 - 3.2.9

CPE2.3 External links

https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
https://rhn.redhat.com/errata/RHSA-2012-0481.html
https://rhn.redhat.com/errata/RHSA-2012-0531.html
https://secunia.com/advisories/48842
https://secunia.com/advisories/48964
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://www.openwall.com/lists/oss-security/2012/02/28/4
https://bugzilla.redhat.com/show_bug.cgi?id=798293
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU44069

Risk: Medium

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2012-1097

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.

Mitigation

Update to version 3.2.10.

Vulnerable software versions

Linux kernel: 3.2.1 - 3.2.9

CPE2.3 External links

https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
https://rhn.redhat.com/errata/RHSA-2012-0481.html
https://rhn.redhat.com/errata/RHSA-2012-0531.html
https://secunia.com/advisories/48842
https://secunia.com/advisories/48898
https://secunia.com/advisories/48964
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://www.openwall.com/lists/oss-security/2012/03/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=799209
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) NULL pointer dereference

EUVDB-ID: #VU44070

Risk: Medium

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2012-1146

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by registering memory threshold events. A remote attacker can perform a denial of service (DoS) attack.

Mitigation

Update to version 3.2.10.

Vulnerable software versions

Linux kernel: 3.2.1 - 3.2.9

CPE2.3 External links

https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=371528caec553785c37f73fa3926ea0de84f986f
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/075781.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
https://secunia.com/advisories/48898
https://secunia.com/advisories/48964
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://www.openwall.com/lists/oss-security/2012/03/07/3
https://bugzilla.redhat.com/show_bug.cgi?id=800813
https://exchange.xforce.ibmcloud.com/vulnerabilities/73711
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###