ACK+Applied: [PATCH 0/2][CVE-2016-4794][vivid, xenial] Use-after-free vulnerability in mm/percpu.c
Kamal Mostafa
kamal at canonical.com
Tue Jul 12 21:14:16 UTC 2016
On Tue, Jul 12, 2016 at 05:03:14PM +0100, Luis Henriques wrote:
> Following this email I'm sending 2 patches (clean cherry-picks) that fix
> CVE-2016-4794 for vivid and xenial. Earlier kernels are not impacted by this
> issue.
Applied to V and X.
-Kamal
>
> Tejun Heo (2):
> percpu: fix synchronization between chunk->map_extend_work and chunk
> destruction
> percpu: fix synchronization between synchronous map extension and
> chunk destruction
>
> mm/percpu.c | 73 +++++++++++++++++++++++++++++++++++++------------------------
> 1 file changed, 44 insertions(+), 29 deletions(-)
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list