Ubuntu Security Notice USN-5728-3
Ubuntu Security Notice 5728-3 - Jann Horn discovered that the Linux kernel
did not properly track memory allocations for anonymous VMA mappings in
some situations, leading to potential data structure reuse. A local
attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that a race condition existed in the
memory address space accounting implementation in the Linux kernel,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service or possibly execute arbitrary code.
https://packetstormsecurity.com/files/170059/USN-5728-3.txt
Wed, 30 Nov 2022 20:39:15 GMT
________________________________
--- The information is for inforamtional purposes only.
* Origin: Read us with
http://winpoint.org JID:
rs@captflint.com