CVE-2012-0879
moderate-risk
Published 2012-05-17
The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.5/10
Medium
LOCAL
/ LOW complexity
Affected Products (9)
References (36)
Mailing List
http://marc.info/?l=bugtraq&m=139447903326211&w=2
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0481.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0531.html
Not Applicable
http://secunia.com/advisories/48545
Not Applicable
http://secunia.com/advisories/48842
Third Party Advisory
http://www.debian.org/security/2012/dsa-2469
Third Party Advisory
http://www.securitytracker.com/id?1027086
Third Party Advisory
http://www.ubuntu.com/usn/USN-1408-1
Third Party Advisory
http://www.ubuntu.com/usn/USN-1410-1
Third Party Advisory
http://www.ubuntu.com/usn/USN-1411-1
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=796829
and 16 more references
33
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
0/34 · Minimal
Exposure
15/34 · Moderate