1.9
CVSSv2

CVE-2012-6546

Published: 15/03/2013 Updated: 07/11/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 170
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

The ATM implementation in the Linux kernel prior to 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 3.2.21

linux linux kernel 3.4.30

linux linux kernel 3.4.4

linux linux kernel 3.0.25

linux linux kernel 3.1.2

linux linux kernel 3.4.11

linux linux kernel 3.0

linux linux kernel 3.2.19

linux linux kernel 3.0.22

linux linux kernel 3.2.23

linux linux kernel 3.4.26

linux linux kernel 3.4.13

linux linux kernel 3.0.5

linux linux kernel 3.5.2

linux linux kernel 3.2.18

linux linux kernel 3.0.68

linux linux kernel 3.3

linux linux kernel 3.0.38

linux linux kernel 3.1

linux linux kernel 3.0.63

linux linux kernel 3.0.46

linux linux kernel 3.0.47

linux linux kernel 3.0.48

linux linux kernel 3.2.5

linux linux kernel 3.2.26

linux linux kernel 3.4

linux linux kernel 3.0.18

linux linux kernel 3.0.6

linux linux kernel 3.0.36

linux linux kernel 3.4.23

linux linux kernel 3.0.35

linux linux kernel 3.0.11

linux linux kernel 3.0.58

linux linux kernel 3.4.28

linux linux kernel 3.0.34

linux linux kernel 3.0.32

linux linux kernel 3.2

linux linux kernel 3.0.52

linux linux kernel 3.0.51

linux linux kernel 3.4.18

linux linux kernel 3.4.6

linux linux kernel 3.2.16

linux linux kernel 3.4.12

linux linux kernel 3.0.57

linux linux kernel 3.3.2

linux linux kernel 3.0.19

linux linux kernel 3.2.27

linux linux kernel 3.4.27

linux linux kernel 3.0.37

linux linux kernel 3.0.4

linux linux kernel 3.3.8

linux linux kernel 3.0.27

linux linux kernel 3.3.3

linux linux kernel 3.4.5

linux linux kernel 3.2.11

linux linux kernel 3.0.42

linux linux kernel 3.0.23

linux linux kernel 3.0.62

linux linux kernel 3.0.49

linux linux kernel 3.2.10

linux linux kernel 3.0.8

linux linux kernel 3.2.14

linux linux kernel

linux linux kernel 3.4.14

linux linux kernel 3.3.4

linux linux kernel 3.2.29

linux linux kernel 3.0.64

linux linux kernel 3.0.40

linux linux kernel 3.4.19

linux linux kernel 3.0.33

linux linux kernel 3.4.9

linux linux kernel 3.4.29

linux linux kernel 3.0.28

linux linux kernel 3.5.6

linux linux kernel 3.3.6

linux linux kernel 3.2.25

linux linux kernel 3.2.4

linux linux kernel 3.4.31

linux linux kernel 3.4.15

linux linux kernel 3.0.54

linux linux kernel 3.0.13

linux linux kernel 3.0.55

linux linux kernel 3.4.3

linux linux kernel 3.2.9

linux linux kernel 3.0.10

linux linux kernel 3.2.15

linux linux kernel 3.0.1

linux linux kernel 3.1.6

linux linux kernel 3.2.20

linux linux kernel 3.2.24

linux linux kernel 3.4.24

linux linux kernel 3.2.6

linux linux kernel 3.2.2

linux linux kernel 3.0.17

linux linux kernel 3.1.3

linux linux kernel 3.1.9

linux linux kernel 3.0.44

linux linux kernel 3.0.16

linux linux kernel 3.5.5

linux linux kernel 3.2.13

linux linux kernel 3.0.21

linux linux kernel 3.0.7

linux linux kernel 3.0.61

linux linux kernel 3.4.10

linux linux kernel 3.4.25

linux linux kernel 3.1.5

linux linux kernel 3.1.8

linux linux kernel 3.2.1

linux linux kernel 3.2.7

linux linux kernel 3.5.3

linux linux kernel 3.0.20

linux linux kernel 3.0.24

linux linux kernel 3.3.5

linux linux kernel 3.4.8

linux linux kernel 3.5.4

linux linux kernel 3.0.15

linux linux kernel 3.0.45

linux linux kernel 3.2.30

linux linux kernel 3.0.39

linux linux kernel 3.0.2

linux linux kernel 3.4.20

linux linux kernel 3.0.67

linux linux kernel 3.0.59

linux linux kernel 3.5.1

linux linux kernel 3.4.2

linux linux kernel 3.0.60

linux linux kernel 3.1.7

linux linux kernel 3.1.1

linux linux kernel 3.0.56

linux linux kernel 3.4.1

linux linux kernel 3.3.7

linux linux kernel 3.0.12

linux linux kernel 3.2.22

linux linux kernel 3.2.17

linux linux kernel 3.4.16

linux linux kernel 3.4.22

linux linux kernel 3.2.8

linux linux kernel 3.1.10

linux linux kernel 3.0.66

linux linux kernel 3.3.1

linux linux kernel 3.0.3

linux linux kernel 3.0.65

linux linux kernel 3.0.53

linux linux kernel 3.0.9

linux linux kernel 3.0.26

linux linux kernel 3.1.4

linux linux kernel 3.4.32

linux linux kernel 3.0.43

linux linux kernel 3.0.30

linux linux kernel 3.0.31

linux linux kernel 3.0.29

linux linux kernel 3.0.50

linux linux kernel 3.2.12

linux linux kernel 3.4.17

linux linux kernel 3.2.28

linux linux kernel 3.0.14

linux linux kernel 3.4.7

linux linux kernel 3.4.21

linux linux kernel 3.2.3

linux linux kernel 3.0.41

redhat enterprise linux 6.0

redhat enterprise linux 5

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant secur ...
Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix several security issues and three bugs arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity im ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2012-2121 Benjamin Herrenschmidt and Jason Baron discovered issues with the IOMMU mapping of memory slots us ...
The system could be made to run actions or potentially programs as an administrator ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The system could be made to perform privileged actions as an administrator ...