Description
The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-2725 | The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call. |
Ubuntu USN |
USN-1448-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1452-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1455-1 | Linux kernel (Oneiric backport) vulnerabilities |
Ubuntu USN |
USN-1459-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1460-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-1567-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-1574-1 | Linux kernel (Natty backport) vulnerabilities |
Ubuntu USN |
USN-1597-1 | Linux kernel (EC2) vulnerability |
Ubuntu USN |
USN-1606-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:42:32.390Z
Reserved: 2012-05-14T00:00:00.000Z
Link: CVE-2012-2745
No data.
Status : Modified
Published: 2012-08-09T10:29:47.027
Modified: 2026-04-29T01:13:23.040
Link: CVE-2012-2745
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN