First published: Tue Mar 20 2012(Updated: )
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedora | =15 | |
Fedora | =16 | |
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1568 is classified as a moderate severity vulnerability.
To fix CVE-2012-1568, update your system with the latest patches provided by Red Hat or Fedora.
CVE-2012-1568 affects Red Hat Enterprise Linux versions 5 and 6, as well as Fedora versions 15 and 16.
CVE-2012-1568 may allow attackers to bypass Address Space Layout Randomization (ASLR) protections.
While there are no publicly known exploits specifically for CVE-2012-1568, the vulnerability can potentially be leveraged by attackers.