The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-2725 The copy_creds function in kernel/cred.c in the Linux kernel before 3.3.2 provides an invalid replacement session keyring to a child process, which allows local users to cause a denial of service (panic) via a crafted application that uses the fork system call.
Ubuntu USN Ubuntu USN USN-1448-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1452-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1455-1 Linux kernel (Oneiric backport) vulnerabilities
Ubuntu USN Ubuntu USN USN-1459-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1460-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-1567-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-1574-1 Linux kernel (Natty backport) vulnerabilities
Ubuntu USN Ubuntu USN USN-1597-1 Linux kernel (EC2) vulnerability
Ubuntu USN Ubuntu USN USN-1606-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T19:42:32.390Z

Reserved: 2012-05-14T00:00:00

Link: CVE-2012-2745

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-08-09T10:29:47.027

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-2745

cve-icon Redhat

Severity : Moderate

Publid Date: 2012-07-10T00:00:00Z

Links: CVE-2012-2745 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses