First published: Mon Sep 24 2012(Updated: )
It was found that the Linux kernel's networking implementation did not correctly handle the setting of the keepalive socket option on raw sockets. A local user able to create a raw socket could use this flaw to crash the system.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-504.3.3.el6 | 0:2.6.32-504.3.3.el6 |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <=3.5.6 | |
Linux kernel | =3.5.1 | |
Linux kernel | =3.5.2 | |
Linux kernel | =3.5.3 | |
Linux kernel | =3.5.4 | |
Linux kernel | =3.5.5 | |
SUSE Linux Enterprise Server | =10.0-sp4 | |
SUSE Linux Enterprise Server | =11.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6657 has a medium severity rating due to its potential to allow a local user to crash the system.
To fix CVE-2012-6657, update your kernel to a version higher than 0:2.6.32-504.3.3.el6 or the specific versions for the Linux kernel that include patches.
CVE-2012-6657 affects various Linux kernel versions including those from Red Hat and SUSE enterprise distributions.
No, CVE-2012-6657 cannot be exploited remotely as it requires local user access to create raw sockets.
The potential impact of CVE-2012-6657 includes system crashes due to improper handling of the keepalive socket option.