4
CVSSv2

CVE-2012-2133

Published: 03/07/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4 | Impact Score: 6.9 | Exploitability Score: 1.9
VMScore: 357
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Summary

Use-after-free vulnerability in the Linux kernel prior to 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.3.2

linux linux kernel 3.3.3

linux linux kernel 3.3.4

linux linux kernel 3.3

linux linux kernel

linux linux kernel 3.3.1

Vendor Advisories

Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-4086 Eric Sandeen reported an issue in the journaling layer for ext4 filesystems (jbd2) Local users can cause buffers to ...
Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix two security issues and several bugs arenow available for Red Hat Enterprise Linux 62 Extended Update SupportThe Red Hat Security Response Team has rated this update as ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel-rt packages that fix several security issues and multiplebugs are now available for Red Hat Enterprise MRG 22The Red Hat Security Response Team has rated this update as havingimportant ...
A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges (CVE-2012-2133, Moderate) A use-after-free flaw was found in the madvise() system call imple ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to crash or run programs as an administrator ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to crash or run programs as an administrator ...
Several security issues were fixed in the kernel ...