CVE-2012-2133

Impact:
Moderate
Public Date:
2012-03-22
CWE:
CWE-416
Bugzilla:
817430: CVE-2012-2133 kernel: use after free bug in "quota" handling

The MITRE CVE dictionary describes this issue as:

Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

Find out more about CVE-2012-2133 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux MRG 2 may address this issue.

CVSS v2 metrics

Base Score 6.2
Base Metrics AV:L/AC:H/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (kernel) RHSA-2012:1426 2012-11-06
Red Hat Enterprise Linux Extended Update Support 6.2 (kernel) RHSA-2013:0741 2013-04-16
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2012:1491 2012-12-04

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Will not fix
Red Hat Enterprise MRG 1 kernel Not affected
Red Hat Enterprise Linux 5 kernel Not affected
Red Hat Enterprise Linux 4 kernel Not affected

Acknowledgements

Red Hat would like to thank Shachar Raindel for reporting this issue.

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.