Your submission was sent successfully! Close

CVE-2012-3510

Published: 03 October 2012

Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
Patches:
Introduced by 9acc1853519a0473620d424105f9d49ea5b4e62e
Fixed by f0ec1aaf54caddd21c259aea8b2ecfbde4ee4fb9
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-lts-backport-maverick
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-lts-backport-natty
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-lts-backport-oneiric
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (2.6.19~rc4)