Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-2136

Опубликовано: 29 мая 2012
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise MRG 2realtime-kernelNot affected
Red Hat Enterprise Linux 5kernelFixedRHSA-2012:069029.05.2012
Red Hat Enterprise Linux 5.6 EUS - Server OnlykernelFixedRHSA-2012:108717.07.2012
Red Hat Enterprise Linux 6kernelFixedRHSA-2012:074318.06.2012

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-228->CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=816289kernel: net: insufficient data_len validation in sock_alloc_send_pskb()

EPSS

Процентиль: 26%
0.00084
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.

nvd
почти 13 лет назад

The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.

debian
почти 13 лет назад

The sock_alloc_send_pskb function in net/core/sock.c in the Linux kern ...

github
около 3 лет назад

The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.

oracle-oval
около 13 лет назад

ELSA-2012-0690: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 26%
0.00084
Низкий

6.2 Medium

CVSS2