** Changed in: linux-armadaxp (Ubuntu Precise) Status: New => Fix Released
** Changed in: linux-armadaxp (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-ec2 (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-oneiric (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New => Fix Committed ** Changed in: linux (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux (Ubuntu Lucid) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux (Ubuntu Natty) Status: In Progress => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Precise) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux-ti-omap4 (Ubuntu Quantal) Status: New => Invalid ** Changed in: linux-ti-omap4 (Ubuntu Natty) Status: New => Fix Committed ** Description changed: A use-after-free flaw has been found in madvise_remove() function in the Linux kernel. madvise_remove() can race with munmap (causing a use- after-free of the vma) or with close (causing a use-after-free of the struct file). An unprivileged local user can use this flaw to crash the system. + + Break-Fix: 90ed52ebe48181d3c5427b3bd1d24f659e7575ad + 9ab4233dd08036fe34a89c7dc6f47a8bf2eb29eb -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1042447 Title: CVE-2012-3511 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1042447/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs