Linux kernel built with support to `tmpfs' is vulnerable to a use-after-free flaw, which happens while remounting tmpfs, which was mounted with mpol=M option initially, but the same is missing in the remount request. A privileged local user could use this flaw to crash the system or, potentially, further escalate their privileges. Upstream fix: ------------- -> https://git.kernel.org/linus/5f00110f7273f9ff04ac69a5f85bb535a4fd0987 References: ----------- 1] http://www.openwall.com/lists/oss-security/2013/02/25/14
Statement: This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5. This issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2.
Created kernel tracking bugs for this issue Affects: fedora-all [bug 915716]
kernel-3.8.3-103.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0744 https://rhn.redhat.com/errata/RHSA-2013-0744.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:0829 https://rhn.redhat.com/errata/RHSA-2013-0829.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.2 EUS - Server Only Via RHSA-2013:0882 https://rhn.redhat.com/errata/RHSA-2013-0882.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6.3 EUS - Server Only Via RHSA-2013:0928 https://rhn.redhat.com/errata/RHSA-2013-0928.html