CVE-2012-2373
Published Aug 9, 2012
Last updated 2 years ago
Overview
- Description
- The Linux kernel before 3.4.5 on the x86 platform, when Physical Address Extension (PAE) is enabled, does not properly use the Page Middle Directory (PMD), which allows local users to cause a denial of service (panic) via a crafted application that triggers a race condition.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 6.9
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-362
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "41A75DAA-62E7-4616-B987-B7FB45E56709", "versionEndIncluding": "3.4.4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "8C3D9C66-933A-469E-9073-75015A8AD17D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "C92F29A0-DEFF-49E4-AE86-5DBDAD51C677" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "5690A703-390D-4D8A-9258-2F47116DAB4F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "AB1EDDA7-15AF-4B45-A931-DFCBB1EEB701" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "952FE0DC-B2ED-4080-BF29-A2C265E83FEF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "1CE7ABDB-6572-40E8-B952-CBE52C999858" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "0F417186-D1ED-4A31-92B2-83DEDA1AF272" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "3D4FCFAE-918C-4886-9A17-08A5B94D35F4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "830D2914-C9FE-406F-AFCE-7A04BB9E2896" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "F4B791B5-2EB5-403A-90CC-B219F6277D1F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "2BA5F34D-7490-4B2B-A7E6-8450F9C1FC31" } ], "operator": "OR" } ] } ]