CVE-2012-0028

Published: 04 January 2012

The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.

From the Ubuntu security team

A flaw was found in how the linux kernel handles user-space held futexs. An unprivileged user could exploit this flaw to cause a denial of service or possibly elevate privileges.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 8141c7f3e7aee618312fa1c15109e1219de784a7
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by fc6b177dee33365ccb29fe6d2092223cf8d679f9
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.32~rc4)