#VU43444 Use-after-free in Linux kernel - CVE-2012-3510
Published: October 3, 2012 / Updated: August 11, 2020
Linux kernel
Linux Foundation
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a taskstats TASKSTATS_CMD_ATTR_PID command. A local users can obtain potentially sensitive information from kernel memory or cause a denial of service (system crash).
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
External links
- http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.19
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9
- http://rhn.redhat.com/errata/RHSA-2012-1323.html
- http://secunia.com/advisories/50811
- http://www.openwall.com/lists/oss-security/2012/08/20/12
- http://www.securityfocus.com/bid/55144
- http://www.securitytracker.com/id?1027602
- https://bugzilla.redhat.com/show_bug.cgi?id=849722
- https://github.com/torvalds/linux/commit/f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9