CVE-2012-2313

The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1174.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1481.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1541.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1589.html Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7 Release Notes
http://www.openwall.com/lists/oss-security/2012/05/04/8 Mailing List
http://www.securityfocus.com/bid/53965 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=818820 Issue Tracking
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 Exploit Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html Third Party Advisory
http://marc.info/?l=bugtraq&m=139447903326211&w=2 Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1174.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1481.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1541.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1589.html Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.7 Release Notes
http://www.openwall.com/lists/oss-security/2012/05/04/8 Mailing List
http://www.securityfocus.com/bid/53965 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=818820 Issue Tracking
https://github.com/torvalds/linux/commit/1bb57e940e1958e40d51f2078f50c3a96a9b2d75 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.3.5:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:novell:suse_linux_enterprise_server:10.0:sp4:*:*:ltss:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:5:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:client:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:5.6.z:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.1.z:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:6.2.z:*:*:*:*:*:*:*

History

No history.

Information

Published : 2012-06-13 10:24

Updated : 2025-04-11 00:51


NVD link : CVE-2012-2313

Mitre link : CVE-2012-2313

CVE.ORG link : CVE-2012-2313


JSON object : View

Products Affected

linux

  • linux_kernel

redhat

  • enterprise_linux_long_life
  • enterprise_linux
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_server_eus
  • enterprise_linux_desktop

novell

  • suse_linux_enterprise_server
CWE
CWE-264

Permissions, Privileges, and Access Controls