Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2012-1090 CVE-2012-1097 CVE-2012-1146 |
CWE-ID | CWE-20 CWE-476 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU44068
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2012-1090
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to perform a denial of service (DoS) attack.
The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 3.2.1 - 3.2.9
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
https://rhn.redhat.com/errata/RHSA-2012-0481.html
https://rhn.redhat.com/errata/RHSA-2012-0531.html
https://secunia.com/advisories/48842
https://secunia.com/advisories/48964
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://www.openwall.com/lists/oss-security/2012/02/28/4
https://bugzilla.redhat.com/show_bug.cgi?id=798293
https://github.com/torvalds/linux/commit/88d7d4e4a439f32acc56a6d860e415ee71d3df08
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44069
Risk: Medium
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2012-1097
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error. A remote attacker can trigger denial of service conditions via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
MitigationUpdate to version 3.2.10.
Vulnerable software versionsLinux kernel: 3.2.1 - 3.2.9
CPE2.3https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
https://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
https://rhn.redhat.com/errata/RHSA-2012-0481.html
https://rhn.redhat.com/errata/RHSA-2012-0531.html
https://secunia.com/advisories/48842
https://secunia.com/advisories/48898
https://secunia.com/advisories/48964
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://www.openwall.com/lists/oss-security/2012/03/05/1
https://bugzilla.redhat.com/show_bug.cgi?id=799209
https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU44070
Risk: Medium
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2012-1146
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error in mm/memcontrol.c in the Linux kernel before 3.2.10 does not properly handle multiple events that are attached to the same eventfd, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by registering memory threshold events. A remote attacker can perform a denial of service (DoS) attack.
MitigationUpdate to version 3.2.10.
Vulnerable software versionsLinux kernel: 3.2.1 - 3.2.9
CPE2.3https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=371528caec553785c37f73fa3926ea0de84f986f
https://lists.fedoraproject.org/pipermail/package-announce/2012-March/075781.html
https://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
https://secunia.com/advisories/48898
https://secunia.com/advisories/48964
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
https://www.openwall.com/lists/oss-security/2012/03/07/3
https://bugzilla.redhat.com/show_bug.cgi?id=800813
https://exchange.xforce.ibmcloud.com/vulnerabilities/73711
https://github.com/torvalds/linux/commit/371528caec553785c37f73fa3926ea0de84f986f
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.