Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-3510

Опубликовано: 30 окт. 2006
Источник: redhat
CVSS2: 5.6
EPSS Низкий

Описание

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

Отчет

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as they already contain upstream commit f0ec1aaf54cadd that fixed this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise MRG 2realtime-kernelNot affected
Red Hat Enterprise Linux 5kernelFixedRHSA-2012:132302.10.2012

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=849722kernel: taskstats: use-after-free in xacct_add_tsk()

EPSS

Процентиль: 27%
0.0009
Низкий

5.6 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 12 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

nvd
больше 12 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

debian
больше 12 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/t ...

github
около 3 лет назад

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

oracle-oval
больше 12 лет назад

ELSA-2012-1323: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 27%
0.0009
Низкий

5.6 Medium

CVSS2