First published: Fri Mar 02 2012(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <3.0.24 | |
Linux Kernel | >=3.1<3.2.10 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise MRG | =2.0 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp1 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp2 | |
SUSE Linux Enterprise High Availability | =11-sp1 | |
SUSE Linux Enterprise High Availability | =11-sp2 | |
suse linux enterprise server vmware | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp1 | |
suse linux enterprise server vmware | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1097 has a moderate severity rating due to its potential to cause denial of service.
To mitigate CVE-2012-1097, upgrade to a fixed version of the Linux kernel, specifically 3.2.10 or later.
CVE-2012-1097 affects several versions of the Linux kernel, specifically those prior to 3.2.10.
CVE-2012-1097 primarily allows local users to cause denial of service, not remote exploitation.
CVE-2012-1097 was publicly disclosed and has known fixes, so it is not classified as a zero-day vulnerability.