Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.
References
Configurations
History
21 Nov 2024, 01:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0 - Broken Link | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259 - | |
References | () http://rhn.redhat.com/errata/RHSA-2012-1540.html - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2012/08/31/11 - Mailing List, Patch, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=853465 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://github.com/torvalds/linux/commit/f6d8bd051c391c1c0458a30b2a7abcd939329259 - Patch, Third Party Advisory |
Information
Published : 2012-10-03 11:02
Updated : 2024-11-21 01:41
NVD link : CVE-2012-3552
Mitre link : CVE-2012-3552
CVE.ORG link : CVE-2012-3552
JSON object : View
Products Affected
redhat
- enterprise_linux_eus
linux
- linux_kernel
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')