[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-3510Date: (C)2012-10-03   (M)2024-02-22


Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.6
Exploit Score: 3.9
Impact Score: 7.8
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECTRACK-1027602
SECUNIA-50811
BID-55144
RHSA-2012:1323
http://www.openwall.com/lists/oss-security/2012/08/20/12
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9
https://bugzilla.redhat.com/show_bug.cgi?id=849722
https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9

CWE    1
CWE-399
OVAL    2
oval:org.secpod.oval:def:202463
oval:org.secpod.oval:def:500902

© SecPod Technologies