A use-after-free flaw has been found in madvise_remove() function in the Linux kernel. madvise_remove() can race with munmap (causing a use-after-free of the vma) or with close (causing a use-after-free of the struct file). An unprivileged local user can use this flaw to crash the system and potentially gain higher privileges. Upstream fix: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb Introduced in: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=90ed52ebe48181d3c5427b3bd1d24f659e7575ad
Created kernel tracking bugs for this issue Affects: fedora-all [bug 849742]
Is there any fix released out now ?
(In reply to comment #5) > Is there any fix released out now ? Not yet (as of right now). Please refer to Red Hat CVE database entry: [1] https://access.redhat.com/security/cve/CVE-2012-3511 for progress / updates. Thank you && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2012:1426 https://rhn.redhat.com/errata/RHSA-2012-1426.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:1491 https://rhn.redhat.com/errata/RHSA-2012-1491.html
Statement: (none)
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1292 https://rhn.redhat.com/errata/RHSA-2013-1292.html