CVE-2012-1097 REJECTED

The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call.

EPSS 0.11% · 29.0th percentile

Risk Scores

EPSS Score
0.11%
29.0th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:14.04:LTSlinux0
Ubuntu:16.04:LTSlinux-flo3.4.0-5.19, 0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux-goldfish3.4.0-1.7, 0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:14.04:LTSlinux-mako0
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:14.04:LTSlinux-flo0
Ubuntu:16.04:LTSlinux-goldfish3.4.0-4.24, 3.4.0-4.26, 0
Ubuntu:14.04:LTSlinux-manta0
Ubuntu:16.04:LTSlinux-snapdragon0
Ubuntu:16.04:LTSlinux-mako3.4.0-7.39, 0

Timeline

References

Open in Interactive Console →