1.9
CVSSv2

CVE-2012-1568

Published: 01/03/2013 Updated: 13/02/2023
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
VMScore: 169
Vector: AV:L/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent malicious users to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 16

redhat enterprise linux 6.0

redhat enterprise linux 5

fedoraproject fedora 15

Vendor Advisories

Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity ...
Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix three security issues and several bugs arenow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity im ...
The ExecShield feature does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries ...
A use-after-free flaw was found in the Linux kernel's memory management subsystem in the way quota handling for huge pages was performed A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges (CVE-2012-2133, Moderate) A use-after-free flaw was found in the madvise() system call imple ...