fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-2127 fs/proc/root.c in the procfs implementation in the Linux kernel before 3.2 does not properly interact with CLONE_NEWPID clone system calls, which allows remote attackers to cause a denial of service (reference leak and memory consumption) by making many connections to a daemon that uses PID namespaces to isolate clients, as demonstrated by vsftpd.
Ubuntu USN Ubuntu USN USN-1594-1 Linux kernel (Oneiric backport) vulnerabilities
Ubuntu USN Ubuntu USN USN-1607-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T19:26:07.743Z

Reserved: 2012-04-04T00:00:00

Link: CVE-2012-2127

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-06-21T23:55:02.880

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-2127

cve-icon Redhat

Severity : Moderate

Publid Date: 2012-04-20T00:00:00Z

Links: CVE-2012-2127 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses