Permissions, Privileges, and Access Controls in Linux kernel - CVE-2012-0028

 

Permissions, Privileges, and Access Controls in Linux kernel - CVE-2012-0028

Published: June 22, 2012 / Updated: August 11, 2020


Vulnerability identifier: #VU43957
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2012-0028
CWE-ID: CWE-264
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.


How to mitigate CVE-2012-0028

Install update from vendor's website.

Sources