Lucene search

K
cve[email protected]CVE-2012-0957
HistoryDec 21, 2012 - 11:47 a.m.

CVE-2012-0957

2012-12-2111:47:35
CWE-16
web.nvd.nist.gov
43
cve-2012-0957
linux kernel
override_release function
kernel stack memory
uname system call
nvd

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:C/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%

The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.4.15
OR
linuxlinux_kernelMatch3.0rc1
OR
linuxlinux_kernelMatch3.0rc2
OR
linuxlinux_kernelMatch3.0rc3
OR
linuxlinux_kernelMatch3.0rc4
OR
linuxlinux_kernelMatch3.0rc5
OR
linuxlinux_kernelMatch3.0rc6
OR
linuxlinux_kernelMatch3.0rc7
OR
linuxlinux_kernelMatch3.0.1
OR
linuxlinux_kernelMatch3.0.2
OR
linuxlinux_kernelMatch3.0.3
OR
linuxlinux_kernelMatch3.0.4
OR
linuxlinux_kernelMatch3.0.5
OR
linuxlinux_kernelMatch3.0.6
OR
linuxlinux_kernelMatch3.0.7
OR
linuxlinux_kernelMatch3.0.8
OR
linuxlinux_kernelMatch3.0.9
OR
linuxlinux_kernelMatch3.0.10
OR
linuxlinux_kernelMatch3.0.11
OR
linuxlinux_kernelMatch3.0.12
OR
linuxlinux_kernelMatch3.0.13
OR
linuxlinux_kernelMatch3.0.14
OR
linuxlinux_kernelMatch3.0.15
OR
linuxlinux_kernelMatch3.0.16
OR
linuxlinux_kernelMatch3.0.17
OR
linuxlinux_kernelMatch3.0.18
OR
linuxlinux_kernelMatch3.0.19
OR
linuxlinux_kernelMatch3.0.20
OR
linuxlinux_kernelMatch3.0.21
OR
linuxlinux_kernelMatch3.0.22
OR
linuxlinux_kernelMatch3.0.23
OR
linuxlinux_kernelMatch3.0.24
OR
linuxlinux_kernelMatch3.0.25
OR
linuxlinux_kernelMatch3.0.26
OR
linuxlinux_kernelMatch3.0.27
OR
linuxlinux_kernelMatch3.0.28
OR
linuxlinux_kernelMatch3.0.29
OR
linuxlinux_kernelMatch3.0.30
OR
linuxlinux_kernelMatch3.0.31
OR
linuxlinux_kernelMatch3.0.32
OR
linuxlinux_kernelMatch3.0.33
OR
linuxlinux_kernelMatch3.0.34
OR
linuxlinux_kernelMatch3.0.35
OR
linuxlinux_kernelMatch3.0.36
OR
linuxlinux_kernelMatch3.0.37
OR
linuxlinux_kernelMatch3.0.38
OR
linuxlinux_kernelMatch3.0.39
OR
linuxlinux_kernelMatch3.0.40
OR
linuxlinux_kernelMatch3.0.41
OR
linuxlinux_kernelMatch3.0.42
OR
linuxlinux_kernelMatch3.0.43
OR
linuxlinux_kernelMatch3.0.44
OR
linuxlinux_kernelMatch3.1
OR
linuxlinux_kernelMatch3.1rc1
OR
linuxlinux_kernelMatch3.1rc2
OR
linuxlinux_kernelMatch3.1rc3
OR
linuxlinux_kernelMatch3.1rc4
OR
linuxlinux_kernelMatch3.1.1
OR
linuxlinux_kernelMatch3.1.2
OR
linuxlinux_kernelMatch3.1.3
OR
linuxlinux_kernelMatch3.1.4
OR
linuxlinux_kernelMatch3.1.5
OR
linuxlinux_kernelMatch3.1.6
OR
linuxlinux_kernelMatch3.1.7
OR
linuxlinux_kernelMatch3.1.8
OR
linuxlinux_kernelMatch3.1.9
OR
linuxlinux_kernelMatch3.1.10
OR
linuxlinux_kernelMatch3.2
OR
linuxlinux_kernelMatch3.2x86
OR
linuxlinux_kernelMatch3.2rc2
OR
linuxlinux_kernelMatch3.2rc3
OR
linuxlinux_kernelMatch3.2rc4
OR
linuxlinux_kernelMatch3.2rc5
OR
linuxlinux_kernelMatch3.2rc6
OR
linuxlinux_kernelMatch3.2rc7
OR
linuxlinux_kernelMatch3.2.1
OR
linuxlinux_kernelMatch3.2.1x86
OR
linuxlinux_kernelMatch3.2.2
OR
linuxlinux_kernelMatch3.2.3
OR
linuxlinux_kernelMatch3.2.4
OR
linuxlinux_kernelMatch3.2.5
OR
linuxlinux_kernelMatch3.2.6
OR
linuxlinux_kernelMatch3.2.7
OR
linuxlinux_kernelMatch3.2.8
OR
linuxlinux_kernelMatch3.2.9
OR
linuxlinux_kernelMatch3.2.10
OR
linuxlinux_kernelMatch3.2.11
OR
linuxlinux_kernelMatch3.2.12
OR
linuxlinux_kernelMatch3.2.13
OR
linuxlinux_kernelMatch3.2.14
OR
linuxlinux_kernelMatch3.2.15
OR
linuxlinux_kernelMatch3.2.16
OR
linuxlinux_kernelMatch3.2.17
OR
linuxlinux_kernelMatch3.2.18
OR
linuxlinux_kernelMatch3.2.19
OR
linuxlinux_kernelMatch3.2.20
OR
linuxlinux_kernelMatch3.2.21
OR
linuxlinux_kernelMatch3.2.22
OR
linuxlinux_kernelMatch3.2.23
OR
linuxlinux_kernelMatch3.2.24
OR
linuxlinux_kernelMatch3.2.25
OR
linuxlinux_kernelMatch3.2.26
OR
linuxlinux_kernelMatch3.2.27
OR
linuxlinux_kernelMatch3.2.28
OR
linuxlinux_kernelMatch3.2.29
OR
linuxlinux_kernelMatch3.2.30
OR
linuxlinux_kernelMatch3.3
OR
linuxlinux_kernelMatch3.3rc1
OR
linuxlinux_kernelMatch3.3rc2
OR
linuxlinux_kernelMatch3.3rc3
OR
linuxlinux_kernelMatch3.3rc4
OR
linuxlinux_kernelMatch3.3rc5
OR
linuxlinux_kernelMatch3.3rc6
OR
linuxlinux_kernelMatch3.3rc7
OR
linuxlinux_kernelMatch3.3.1
OR
linuxlinux_kernelMatch3.3.2
OR
linuxlinux_kernelMatch3.3.3
OR
linuxlinux_kernelMatch3.3.4
OR
linuxlinux_kernelMatch3.3.5
OR
linuxlinux_kernelMatch3.3.6
OR
linuxlinux_kernelMatch3.3.7
OR
linuxlinux_kernelMatch3.3.8
OR
linuxlinux_kernelMatch3.4
OR
linuxlinux_kernelMatch3.4x86
OR
linuxlinux_kernelMatch3.4rc1
OR
linuxlinux_kernelMatch3.4rc1x86
OR
linuxlinux_kernelMatch3.4rc2
OR
linuxlinux_kernelMatch3.4rc2x86
OR
linuxlinux_kernelMatch3.4rc3
OR
linuxlinux_kernelMatch3.4rc3x86
OR
linuxlinux_kernelMatch3.4rc4
OR
linuxlinux_kernelMatch3.4rc4x86
OR
linuxlinux_kernelMatch3.4rc5
OR
linuxlinux_kernelMatch3.4rc5x86
OR
linuxlinux_kernelMatch3.4rc6
OR
linuxlinux_kernelMatch3.4rc6x86
OR
linuxlinux_kernelMatch3.4rc7
OR
linuxlinux_kernelMatch3.4rc7x86
OR
linuxlinux_kernelMatch3.4.1
OR
linuxlinux_kernelMatch3.4.1x86
OR
linuxlinux_kernelMatch3.4.2
OR
linuxlinux_kernelMatch3.4.2x86
OR
linuxlinux_kernelMatch3.4.3
OR
linuxlinux_kernelMatch3.4.3x86
OR
linuxlinux_kernelMatch3.4.4
OR
linuxlinux_kernelMatch3.4.4x86
OR
linuxlinux_kernelMatch3.4.5
OR
linuxlinux_kernelMatch3.4.5x86
OR
linuxlinux_kernelMatch3.4.10
OR
linuxlinux_kernelMatch3.4.11
OR
linuxlinux_kernelMatch3.4.12
OR
linuxlinux_kernelMatch3.4.13
OR
linuxlinux_kernelMatch3.4.14

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:C/I:N/A:N

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

0.4%