fkie_cve-2012-0028
Vulnerability from fkie_nvd
Published
2012-06-21 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.
Impacted products
Vendor Product Version
linux linux_kernel *
linux linux_kernel 2.6.27
linux linux_kernel 2.6.27.1
linux linux_kernel 2.6.27.2
linux linux_kernel 2.6.27.3
linux linux_kernel 2.6.27.4
linux linux_kernel 2.6.27.5
linux linux_kernel 2.6.27.6
linux linux_kernel 2.6.27.7
linux linux_kernel 2.6.27.8
linux linux_kernel 2.6.27.9
linux linux_kernel 2.6.27.10
linux linux_kernel 2.6.27.11
linux linux_kernel 2.6.27.12
linux linux_kernel 2.6.27.13
linux linux_kernel 2.6.27.14
linux linux_kernel 2.6.27.15
linux linux_kernel 2.6.27.16
linux linux_kernel 2.6.27.17
linux linux_kernel 2.6.27.18
linux linux_kernel 2.6.27.19
linux linux_kernel 2.6.27.20
linux linux_kernel 2.6.27.21
linux linux_kernel 2.6.27.22
linux linux_kernel 2.6.27.23
linux linux_kernel 2.6.27.24
linux linux_kernel 2.6.27.25
linux linux_kernel 2.6.27.26
linux linux_kernel 2.6.27.27
linux linux_kernel 2.6.27.28
linux linux_kernel 2.6.27.29
linux linux_kernel 2.6.27.30
linux linux_kernel 2.6.27.31
linux linux_kernel 2.6.27.32
linux linux_kernel 2.6.27.33
linux linux_kernel 2.6.27.34
linux linux_kernel 2.6.27.35
linux linux_kernel 2.6.27.36
linux linux_kernel 2.6.27.37
linux linux_kernel 2.6.27.38
linux linux_kernel 2.6.27.39
linux linux_kernel 2.6.27.40
linux linux_kernel 2.6.27.41
linux linux_kernel 2.6.27.42
linux linux_kernel 2.6.27.43
linux linux_kernel 2.6.27.44
linux linux_kernel 2.6.27.45
linux linux_kernel 2.6.27.46
linux linux_kernel 2.6.27.47
linux linux_kernel 2.6.27.48
linux linux_kernel 2.6.27.49
linux linux_kernel 2.6.27.50
linux linux_kernel 2.6.27.51
linux linux_kernel 2.6.27.52
linux linux_kernel 2.6.27.53
linux linux_kernel 2.6.27.54
linux linux_kernel 2.6.27.55
linux linux_kernel 2.6.27.56
linux linux_kernel 2.6.27.57
linux linux_kernel 2.6.27.58
linux linux_kernel 2.6.27.59
linux linux_kernel 2.6.27.60
linux linux_kernel 2.6.27.61



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80BC5D0-5596-44BA-90F2-261360893E55",
              "versionEndIncluding": "2.6.27.62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "856FE78A-29B5-4411-98A0-4B0281C17EB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "324B5A3E-FA65-4F02-9B8F-872F38CD1808",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C75A8FC4-58D2-4B6A-9D8E-FF12DF52E249",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE21E2AE-9E01-471C-A419-6AB40A49C2F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADFC2D46-65D0-426F-9AF8-8C910AE91D49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "11795F8E-7ACD-4597-9194-FC7241DCE057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "60F381E1-F3C5-49BE-B094-4D90E7B108F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82A6217-CFA6-4E72-8BED-0297E13EABF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CEA1AF2-2DE7-4B38-987D-15FFA70F06B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7954A701-1671-4080-B1E6-47E0208FD28C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "63D06512-EAF0-48C6-98F0-066E63FF07EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F35DA6B-C6D4-47CC-97E7-9659DCFDD162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D75B48F1-623A-4B96-9E08-4AA2DE748490",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E6EB7C3-D9AB-43E7-8B78-2C36AE920935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FC87A28-C6A1-4E90-BD9F-A5BE1985DB50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "0383E2A5-60EE-47F3-9DA8-BF75028D511F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B0C229-2A79-47E0-856A-2AE0FF97B967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB27B247-D6BF-49C4-B113-76C9A47B7DCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94BA1B0-52B9-4303-9C41-3ACC3AC1945E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ACBB194-1D24-464A-B79C-44B8127EAD52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E5F269-7711-447D-B798-0F5478E36299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0138807-6313-4A3F-AB5A-4B7D4A9BE287",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BA2227-F259-499D-BF50-5074B1E7DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "78A896D0-032C-4467-9D57-E47E8C612704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D1D4C8F-8C09-4A49-AFFD-33093AE7A437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "A415FECF-89CC-4D71-B1BF-6A678D32599D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "98F77E54-5F4A-4D47-8DE8-097B4BBC7944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "752148FC-1594-4108-AE0F-C5145B978454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "09546671-E75D-4F50-9D86-DFDDAC9DC5DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDC7A2D7-ACB4-4871-B7C0-02711A53DF1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "6964925C-4394-4E82-976B-770A99E74F1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C909E-02D7-4B29-AA68-897BD0200B7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA036609-ADD3-4903-AB9D-E8BF81CFC776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "38F9E122-994B-4276-9FCF-A8E4D2D06D4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A15720C-3BDF-4343-B270-2575978293EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5ADCFA-2CD8-4A00-AFEC-B84F7E0015A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA2EE9B-27FD-49FE-8665-159DABA0E3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C81C5F8-2224-4D84-B7C0-E18421276AFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44A2C76-174E-40A5-9603-3B84D0D35557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "42ACE154-0709-4AA1-82E3-1B7F34E63187",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "3022E902-9F0D-49FF-9279-71E0E1E8A873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF77B26-91FA-4245-BFEC-43FD021A28E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "601B4C93-9A9C-40E8-A9D0-DA9D71C745EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF7CE35A-87A4-4D95-86F9-211D50E30482",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEA8675A-A37C-4658-9D26-3359EBA277B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E8CB86-ECEE-4435-BEFC-B8D209B2C5AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373DEAE-8F8B-44AA-BAE5-3A0120A541F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D40063F-13D0-4897-AE71-1C7B617C8855",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC7E89C8-CF89-4FA8-A9F1-F0B415E5FE10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4034EFE6-449D-4749-9265-B47D44AA4EC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F835D17-ACF9-4AE6-8C38-B74BE448B8B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A12676-7EBE-4D83-83BD-D46CC7A1773A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FB112DB-891D-4FDB-8772-2E233A39A7BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B3A0794-B10C-4DFD-9CAD-202CA1DC9250",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "76E86CE6-CD1C-4412-939F-B45867068D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6896A4-16E0-46B6-B90C-5C002C526478",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "469534AB-2D0F-4B31-8121-05A792FA9332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2820354-F25B-485D-9FA7-E32B38DDBB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF88BEB3-9EA4-47AA-B24E-DE9AD879382A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4209B4C-4901-4235-B35E-B0085AF1952F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D748A69-4A93-421E-AD83-2B63B2460A2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.27.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "2727A6AE-A1B6-4158-BB73-49D7C86104F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de robust futex en el kernel de Linux antes de v2.6.28 no maneja adecuadamente los procesos que realizan llamadas Exec System Recovery, lo que permite a usuarios locales provocar una denegaci\u00f3n de servicio o posiblemente obtener privilegios escribiendo en una ubicaci\u00f3n de memoria en un proceso hijo."
    }
  ],
  "id": "CVE-2012-0028",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-21T23:55:02.520",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8141c7f3e7aee618312fa1c15109e1219de784a7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/08/1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771764"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/torvalds/linux/commit/8141c7f3e7aee618312fa1c15109e1219de784a7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8141c7f3e7aee618312fa1c15109e1219de784a7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/05/08/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/torvalds/linux/commit/8141c7f3e7aee618312fa1c15109e1219de784a7"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…