CVE-2012-1097 - Pluteal Centipede
Description
The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Reference
http://www.openwall.com/lists/oss-security/2012/03/05/1 https://github.com/torvalds/linux/commit/c8e252586f8d5de906385d8cf6385fee289a825e http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c8e252586f8d5de906385d8cf6385fee289a825e https://bugzilla.redhat.com/show_bug.cgi?id=799209 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.10 http://secunia.com/advisories/48898 http://secunia.com/advisories/48842 http://secunia.com/advisories/48964 http://rhn.redhat.com/errata/RHSA-2012-0531.html http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00013.html http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html http://rhn.redhat.com/errata/RHSA-2012-0481.html
Attack Complexity
LOW
Privileges Required
LOW
User Interaction Required
LOW
Scope
NONE
Confidentiality Impact
UNCHANGED
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
HIGH
Base Severity
7.8