CVE-2012-1097
Published May 17, 2012
Last updated 2 years ago
Overview
- Description
- The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-476
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90D700E9-ABBF-4CA7-908E-99146F8CED6E", "versionEndExcluding": "3.0.24" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6DAE145-A55C-472F-B276-341EA6940F6A", "versionEndExcluding": "3.2.10", "versionStartIncluding": "3.1" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49" }, { "criteria": "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C60FA8B1-1802-4522-A088-22171DCF7A93" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "60FBDD82-691C-4D9D-B71B-F9AFF6931B53" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00720D8C-3FF3-4B1C-B74B-91F01A544399" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB74DEB4-2BD1-4A65-AFDA-C331BC20C178" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DF49412C-CF41-4251-B1FB-F0E63AC9E019" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:*", "vulnerable": true, "matchCriteriaId": "A6B7CDCA-6F39-4113-B5D3-3AA9D7F3D809" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "A5FA293A-23D8-445E-B08C-72B0A2A20EC3" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "vulnerable": true, "matchCriteriaId": "DB4D6749-81A1-41D7-BF4F-1C45A7F49A22" }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:*", "vulnerable": true, "matchCriteriaId": "1A9E2971-0D30-4A8D-8BF8-99E4E9E4CF86" } ], "operator": "OR" } ] } ]