Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0810

Опубликовано: 12 фев. 2020
Источник: debian

Описание

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed3.2.16-1package
linux-2.6not-affectedsqueezepackage

Примечания

  • Ben Hutchings said it was fixed in 3.2.9-1, I checked it for 3.2.16-1

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 6 лет назад

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention. If there is contention on this lock then the task may schedule out. As the task is using a per CPU stack, and another task may come in and use the same stack, the stack can become corrupted and cause the kernel to panic.

redhat
почти 14 лет назад

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

CVSS3: 5.5
nvd
почти 6 лет назад

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.

github
почти 4 года назад

The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.