A certain Red Hat patch for the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows local users to cause a denial of service (invalid free operation and system crash) or possibly gain privileges via a sendmsg system call with the IP_RETOPTS option, as demonstrated by hemlock.c. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-3552.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_linux | Redhat | 6.0 (including) | 6.0 (including) |
OpenStack 3 for RHEL 6 | RedHat | kernel-0:2.6.32-358.118.1.openstack.el6 | * |
Red Hat Enterprise Linux 5 | RedHat | kernel-0:2.6.18-348.16.1.el5 | * |
Red Hat Enterprise Linux 6 | RedHat | kernel-0:2.6.32-358.18.1.el6 | * |
Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only | RedHat | kernel-0:2.6.32-279.37.2.el6 | * |
Linux-fsl-imx51 | Ubuntu | lucid | * |
Linux-linaro-omap | Ubuntu | precise | * |
Linux-linaro-omap | Ubuntu | quantal | * |
Linux-linaro-shared | Ubuntu | precise | * |
Linux-linaro-shared | Ubuntu | quantal | * |
Linux-linaro-vexpress | Ubuntu | precise | * |
Linux-linaro-vexpress | Ubuntu | quantal | * |
Linux-lts-backport-maverick | Ubuntu | lucid | * |
Linux-mvl-dove | Ubuntu | lucid | * |
Linux-qcm-msm | Ubuntu | lucid | * |
Linux-qcm-msm | Ubuntu | precise | * |
Linux-qcm-msm | Ubuntu | quantal | * |