Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0056

Опубликовано: 27 янв. 2012
Источник: debian
EPSS Высокий

Описание

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed3.2.1-2package
linux-2.6not-affectedsqueezepackage
linux-2.6not-affectedlennypackage

Примечания

  • fix is http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=e268337dfe26dfc7efd422a804dbb27977a3cccc (queued for 3.3)

EPSS

Процентиль: 99%
0.80306
Высокий

Связанные уязвимости

ubuntu
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

redhat
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

nvd
больше 13 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

github
около 3 лет назад

The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/<pid>/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.

oracle-oval
больше 13 лет назад

ELSA-2012-0052: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 99%
0.80306
Высокий