A use-after-free flaw was found in the Linux kernel’s mm/mremap memory address space accounting source code. This issue occurs due to a race condition between rmap walk and mremap, allowing a local user to crash the system or potentially escalate their privileges on the system.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel |
||
redhat enterprise linux 8.0 |
||
redhat enterprise linux server tus 8.8 |
||
redhat enterprise linux eus 8.8 |
||
redhat enterprise linux for power little endian 8.0_ppc64le |
||
redhat enterprise linux for power little endian eus 8.8_ppc64le |