CWE
264
Advisory Published
CVE Published
Updated

CVE-2012-0056

First published: Wed Jan 18 2012(Updated: )

From Linus' patch: "Jüri Aedla reported that the /proc/&lt;pid&gt;/mem handling really isn't very robust, and it also doesn't match the permission checking of any of the other related files. This changes it to do the permission checks at open time, and instead of tracking the process, it tracks the VM at the time of the open. That simplifies the code a lot, but does mean that if you hold the file descriptor open over an execve(), you'll continue to read from the _old_ VM." A local, unprivileged user could use this flaw to escalate their privileges. Upstream commit: <a href="http://git.kernel.org/linus/e268337dfe26dfc7efd422a804dbb27977a3cccc">http://git.kernel.org/linus/e268337dfe26dfc7efd422a804dbb27977a3cccc</a> Acknowledgements: Red Hat would like to thank Jüri Aedla for reporting this issue.

Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
Linux kernel>=2.6.39<3.0.18
Linux kernel>=3.1<3.2.2
debian/linux-2.6
Linux Kernel>=2.6.39<3.0.18
Linux Kernel>=3.1<3.2.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2012-0056?

    CVE-2012-0056 is classified as having a medium severity level.

  • How do I fix CVE-2012-0056?

    To address CVE-2012-0056, it is recommended to update the Linux kernel to a version that is not vulnerable.

  • What types of systems are affected by CVE-2012-0056?

    CVE-2012-0056 affects versions of the Linux kernel between 2.6.39 and 3.2.2.

  • What does CVE-2012-0056 exploit?

    CVE-2012-0056 exploits insufficient permission checks in the /proc/<pid>/mem file handling.

  • Who reported the vulnerability identified as CVE-2012-0056?

    CVE-2012-0056 was reported by Jüri Aedla.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203