CVE-2012-2123 REJECTED

The cap_bprm_set_creds function in security/commoncap.c in the Linux kernel before 3.3.3 does not properly handle the use of file system capabilities (aka fcaps) for implementing a privileged executable file, which allows local users to bypass intended personality restrictions via a crafted application, as demonstrated by an attack that uses a parent process to disable ASLR.

EPSS 0.06% · 17.7th percentile

Risk Scores

EPSS Score
0.06%
17.7th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-flo3.4.0-5.19, 0
Ubuntu:16.04:LTSlinux-mako0, 3.4.0-7.39
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:14.04:LTSlinux-mako0
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:14.04:LTSlinux-flo0
Ubuntu:14.04:LTSlinux0
Ubuntu:14.04:LTSlinux-goldfish3.4.0-1.7, 0
Ubuntu:14.04:LTSlinux-manta0
Ubuntu:16.04:LTSlinux-goldfish3.4.0-4.26, 0, 3.4.0-4.24
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-snapdragon0

Timeline

References

Open in Interactive Console →