First published: Wed Jan 18 2012(Updated: )
From Linus' patch: "Jüri Aedla reported that the /proc/<pid>/mem handling really isn't very robust, and it also doesn't match the permission checking of any of the other related files. This changes it to do the permission checks at open time, and instead of tracking the process, it tracks the VM at the time of the open. That simplifies the code a lot, but does mean that if you hold the file descriptor open over an execve(), you'll continue to read from the _old_ VM." A local, unprivileged user could use this flaw to escalate their privileges. Upstream commit: <a href="http://git.kernel.org/linus/e268337dfe26dfc7efd422a804dbb27977a3cccc">http://git.kernel.org/linus/e268337dfe26dfc7efd422a804dbb27977a3cccc</a> Acknowledgements: Red Hat would like to thank Jüri Aedla for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=2.6.39<3.0.18 | |
Linux kernel | >=3.1<3.2.2 | |
debian/linux-2.6 | ||
Linux Kernel | >=2.6.39<3.0.18 | |
Linux Kernel | >=3.1<3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0056 is classified as having a medium severity level.
To address CVE-2012-0056, it is recommended to update the Linux kernel to a version that is not vulnerable.
CVE-2012-0056 affects versions of the Linux kernel between 2.6.39 and 3.2.2.
CVE-2012-0056 exploits insufficient permission checks in the /proc/<pid>/mem file handling.
CVE-2012-0056 was reported by Jüri Aedla.