CVE-2012-2313

The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1174.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1481.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1541.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1589.html Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7 Release Notes
http://www.openwall.com/lists/oss-security/2012/05/04/8 Mailing List
http://www.securityfocus.com/bid/53965 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=818820 Issue Tracking
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 Exploit Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1174.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1481.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1541.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1589.html Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7 Release Notes
http://www.openwall.com/lists/oss-security/2012/05/04/8 Mailing List
http://www.securityfocus.com/bid/53965 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=818820 Issue Tracking
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:novell:suse_linux_enterprise_server:10.0:sp4:*:*:ltss:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.6.z:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.1.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:*

History

21 Nov 2024, 01:38

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75 -
References () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Third Party Advisory () http://marc.info/?l=bugtraq&m=139447903326211&w=2 - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-1174.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1174.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-1481.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1481.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-1541.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1541.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-1589.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1589.html - Third Party Advisory
References () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7 - Release Notes () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7 - Release Notes
References () http://www.openwall.com/lists/oss-security/2012/05/04/8 - Mailing List () http://www.openwall.com/lists/oss-security/2012/05/04/8 - Mailing List
References () http://www.securityfocus.com/bid/53965 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/53965 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=818820 - Issue Tracking () https://bugzilla.redhat.com/show_bug.cgi?id=818820 - Issue Tracking
References () https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 - Exploit, Patch () https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 - Exploit, Patch

Information

Published : 2012-06-13 10:24

Updated : 2024-11-21 01:38


NVD link : CVE-2012-2313

Mitre link : CVE-2012-2313

CVE.ORG link : CVE-2012-2313


JSON object : View

Products Affected

redhat

  • enterprise_linux_server_eus
  • enterprise_linux
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_long_life

linux

  • linux_kernel

novell

  • suse_linux_enterprise_server
CWE
CWE-264

Permissions, Privileges, and Access Controls