CVE-2012-2745
Published: 9 August 2012
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
From the Ubuntu security team
A flaw was found in how the Linux kernel passed the replacement session keyring to a child process. An unprivileged local user could exploit this flaw to cause a denial of service (panic).
Priority
Status
Notes
Author | Note |
---|---|
jdstrand | linux-armadaxp is maintained by OEM |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2745
- https://rhn.redhat.com/errata/RHSA-2012-1064.html
- https://ubuntu.com/security/notices/USN-1567-1
- https://ubuntu.com/security/notices/USN-1574-1
- https://ubuntu.com/security/notices/USN-1448-1
- https://ubuntu.com/security/notices/USN-1459-1
- https://ubuntu.com/security/notices/USN-1460-1
- https://ubuntu.com/security/notices/USN-1452-1
- https://ubuntu.com/security/notices/USN-1597-1
- https://ubuntu.com/security/notices/USN-1606-1
- https://ubuntu.com/security/notices/USN-1455-1
- NVD
- Launchpad
- Debian