** Description changed:

- An use-after-free flaw has been found in the way taskstat's
- TASKSTATS_CMD_ATTR_PID command and exiting tasks with already freed mm
- interacted. An unprivileged local user could use this flaw to crash the
- system or leak kernel memory. Please note that the fix below is from
- year 2006.
+ Use-after-free vulnerability in the xacct_add_tsk function in
+ kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to
+ obtain potentially sensitive information from kernel memory or cause a
+ denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID
+ command.
  
  Break-Fix: 9acc1853519a0473620d424105f9d49ea5b4e62e
  f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1042443

Title:
  CVE-2012-3510

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1042443/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to