First published: Mon Mar 26 2012(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux Kernel | <3.0.29 | |
Linux Kernel | >=3.1<3.2.16 | |
Linux Kernel | >=3.3<3.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2123 is classified as a medium severity vulnerability allowing local users to bypass intended restrictions.
To fix CVE-2012-2123, it is recommended to update the Linux kernel to version 3.3.3 or later.
CVE-2012-2123 affects Linux kernels prior to version 3.3.3, including versions 3.0.x and 3.2.x.
The main issue with CVE-2012-2123 is improper handling of file system capabilities in the cap_bprm_set_creds function.
Yes, CVE-2012-2123 can allow local users to escalate privileges by bypassing security restrictions.