CVE-2012-2133
kernel: use after free bug in "quota" handling
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.
Una vulnerabilidad de uso después de liberación en el kernel de Linux en versiones anteriores a la v3.3.6, cuando 'huge pages' está habilitado, permite a usuarios locales provocar una denegación de servicio (caída del sistema) o posiblemente obtener privilegios mediante la interacción con un sistema de archivos hugetlbfs, tal y como lo demuestra una operación de umount que provoca un manejo inadecuado de los datos de cuota.
The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way Netlink messages without SCM_CREDENTIALS data set were handled. When not explicitly set, the data was sent but with all values set to 0, including the process ID and user ID, causing the Netlink message to appear as if it were sent with root privileges. A local, unprivileged user could use this flaw to send spoofed Netlink messages to an application, possibly resulting in the application performing privileged operations if it relied on SCM_CREDENTIALS data for the authentication of Netlink messages.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-04-04 CVE Reserved
- 2012-05-11 CVE Published
- 2024-08-06 CVE Updated
- 2025-06-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
- CWE-416: Use After Free
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=90481622d75715bfcb68501280a917dbfe516029 | X_refsource_confirm | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.6 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2012/04/24/12 | Mailing List |
|
http://www.securityfocus.com/bid/53233 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75168 | Vdb Entry | |
https://github.com/torvalds/linux/commit/90481622d75715bfcb68501280a917dbfe516029 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html | 2023-02-13 | |
http://www.debian.org/security/2012/dsa-2469 | 2023-02-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=817430 | 2013-04-16 | |
https://access.redhat.com/security/cve/CVE-2012-2133 | 2013-04-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 3.3.5 Search vendor "Linux" for product "Linux Kernel" and version " <= 3.3.5" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.3 Search vendor "Linux" for product "Linux Kernel" and version "3.3" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.3.1 Search vendor "Linux" for product "Linux Kernel" and version "3.3.1" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.3.2 Search vendor "Linux" for product "Linux Kernel" and version "3.3.2" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.3.3 Search vendor "Linux" for product "Linux Kernel" and version "3.3.3" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | 3.3.4 Search vendor "Linux" for product "Linux Kernel" and version "3.3.4" | - |
Affected
|