A security flaw was discovered in the Linux kernel. The vmacache_flush_all() function in mm/vmacache.c mishandles sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations. References: https://seclists.org/oss-sec/2018/q3/251 An upstream patch: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7a9cdebdcc17e426fb5287e4a82db1dfe86339b2
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1631206]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3656 https://access.redhat.com/errata/RHSA-2018:3656