CVE-2012-2384
Published Jun 13, 2012
Last updated 2 years ago
Overview
- Description
- Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.9
- Impact score
- 6.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-189
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0CE28E0-37FE-4029-8E27-1D252D4E3B79", "versionEndIncluding": "3.3.4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFB76697-1C2F-48C0-9B14-517EC053D4B3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BED88DFD-1DC5-4505-A441-44ECDEF0252D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBFD2ACD-728A-4082-BB6A-A1EF6E58E47D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C31B0E51-F62D-4053-B04F-FC4D5BC373D2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A914303E-1CB6-4AAD-9F5F-DE5433C4E814" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "203BBA69-90B2-4C5E-8023-C14180742421" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DBFAB53-B889-4028-AC0E-7E165B152A18" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE409AEC-F677-4DEF-8EB7-2C35809043CE" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "578EC12B-402F-4AD4-B8F8-C9B2CAB06891" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "877002ED-8097-4BB4-BB88-6FC6306C38B2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76294CE3-D72C-41D5-9E0F-B693D0042699" } ], "operator": "OR" } ] } ]