CVE-2012-2136

The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc Broken Link
http://rhn.redhat.com/errata/RHSA-2012-0743.html Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2012-1087.html Third Party Advisory
http://secunia.com/advisories/50807 URL Repurposed
http://ubuntu.com/usn/usn-1529-1 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 Vendor Advisory
http://www.securityfocus.com/bid/53721 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1535-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=816289 Issue Tracking
https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc Exploit Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc Broken Link
http://rhn.redhat.com/errata/RHSA-2012-0743.html Third Party Advisory VDB Entry
http://rhn.redhat.com/errata/RHSA-2012-1087.html Third Party Advisory
http://secunia.com/advisories/50807 URL Repurposed
http://ubuntu.com/usn/usn-1529-1 Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 Vendor Advisory
http://www.securityfocus.com/bid/53721 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-1535-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=816289 Issue Tracking
https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc - Broken Link () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc - Broken Link
References () http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory, VDB Entry () http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory, VDB Entry
References () http://rhn.redhat.com/errata/RHSA-2012-1087.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1087.html - Third Party Advisory
References () http://secunia.com/advisories/50807 - URL Repurposed () http://secunia.com/advisories/50807 - URL Repurposed
References () http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 - Vendor Advisory () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 - Vendor Advisory
References () http://www.securityfocus.com/bid/53721 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/53721 - Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-1535-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-1535-1 - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=816289 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=816289 - Issue Tracking
References () https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc - Exploit, Patch () https://github.com/torvalds/linux/commit/cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc - Exploit, Patch

12 Oct 2023, 14:12

Type Values Removed Values Added
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=816289 - (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=816289 - Issue Tracking
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1087.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-1087.html - Third Party Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-1535-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-1535-1 - Third Party Advisory
References (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc - (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc - Broken Link
References (UBUNTU) http://ubuntu.com/usn/usn-1529-1 - (UBUNTU) http://ubuntu.com/usn/usn-1529-1 - Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/50807 - (SECUNIA) http://secunia.com/advisories/50807 - URL Repurposed
References (BID) http://www.securityfocus.com/bid/53721 - (BID) http://www.securityfocus.com/bid/53721 - Third Party Advisory, VDB Entry
References (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 - (CONFIRM) http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 - Vendor Advisory
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0743.html - (REDHAT) http://rhn.redhat.com/errata/RHSA-2012-0743.html - Third Party Advisory, VDB Entry
CPE cpe:2.3:o:linux:linux_kernel:3.4:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.4:rc4:*:*:*:*:*:*

Information

Published : 2012-08-09 10:29

Updated : 2024-11-21 01:38


NVD link : CVE-2012-2136

Mitre link : CVE-2012-2136

CVE.ORG link : CVE-2012-2136


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation