CVE-2012-1097
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
17/05/2012
Last modified:
11/04/2025
Description
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.0.24 (excluding) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.1 (including) | 3.2.10 (excluding) |
| cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp1:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:vmware:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:-:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:* | ||
| cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:-:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Dc8e252586f8d5de906385d8cf6385fee289a825e
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2012-0481.html
- http://rhn.redhat.com/errata/RHSA-2012-0531.html
- http://secunia.com/advisories/48842
- http://secunia.com/advisories/48898
- http://secunia.com/advisories/48964
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
- http://www.openwall.com/lists/oss-security/2012/03/05/1
- https://bugzilla.redhat.com/show_bug.cgi?id=799209
- https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Dc8e252586f8d5de906385d8cf6385fee289a825e
- http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
- http://rhn.redhat.com/errata/RHSA-2012-0481.html
- http://rhn.redhat.com/errata/RHSA-2012-0531.html
- http://secunia.com/advisories/48842
- http://secunia.com/advisories/48898
- http://secunia.com/advisories/48964
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10
- http://www.openwall.com/lists/oss-security/2012/03/05/1
- https://bugzilla.redhat.com/show_bug.cgi?id=799209
- https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e



