Vulnerability Description
Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 3.3.5 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
- http://www.debian.org/security/2012/dsa-2469
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.6
- http://www.openwall.com/lists/oss-security/2012/04/24/12
- http://www.securityfocus.com/bid/53233
- https://bugzilla.redhat.com/show_bug.cgi?id=817430
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75168
- https://github.com/torvalds/linux/commit/90481622d75715bfcb68501280a917dbfe51602
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html
- http://www.debian.org/security/2012/dsa-2469
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.6
- http://www.openwall.com/lists/oss-security/2012/04/24/12
- http://www.securityfocus.com/bid/53233
FAQ
What is CVE-2012-2133?
CVE-2012-2133 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting wi...
How severe is CVE-2012-2133?
CVE-2012-2133 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2133?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.