*** This bug is a security vulnerability ***

Public security bug reported:

kernel: mm: read_pmd_atomic: 32bit PAE pmd walk vs pmd_populate SMP race
condition. When holding the mmap_sem for reading, pmd_offset_map_lock
should only run on a pmd_t that has been read atomically from the pmdp
pointer, otherwise we may read only half of it leading to this crash.

** Affects: linux (Ubuntu)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu)
     Importance: Low
         Status: New

** Affects: linux-ec2 (Ubuntu)
     Importance: Low
         Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-oneiric (Ubuntu)
     Importance: Low
         Status: Invalid

** Affects: linux-mvl-dove (Ubuntu)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu)
     Importance: Low
         Status: New

** Affects: linux (Ubuntu Lucid)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu Lucid)
     Importance: Low
         Status: Invalid

** Affects: linux-ec2 (Ubuntu Lucid)
     Importance: Low
         Status: New

** Affects: linux-fsl-imx51 (Ubuntu Lucid)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Lucid)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu Lucid)
     Importance: Low
         Status: New

** Affects: linux-lts-backport-oneiric (Ubuntu Lucid)
     Importance: Low
         Status: New

** Affects: linux-mvl-dove (Ubuntu Lucid)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Lucid)
     Importance: Low
         Status: Invalid

** Affects: linux (Ubuntu Natty)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-ec2 (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-oneiric (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Natty)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Natty)
     Importance: Low
         Status: New

** Affects: linux (Ubuntu Oneiric)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-ec2 (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-oneiric (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Oneiric)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Oneiric)
     Importance: Low
         Status: New

** Affects: linux (Ubuntu Precise)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu Precise)
     Importance: Low
         Status: New

** Affects: linux-ec2 (Ubuntu Precise)
     Importance: Low
         Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Precise)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Precise)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu Precise)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-oneiric (Ubuntu Precise)
     Importance: Low
         Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Precise)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Precise)
     Importance: Low
         Status: New

** Affects: linux (Ubuntu Quantal)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu Quantal)
     Importance: Low
         Status: New

** Affects: linux-ec2 (Ubuntu Quantal)
     Importance: Low
         Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Quantal)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Quantal)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu Quantal)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-oneiric (Ubuntu Quantal)
     Importance: Low
         Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Quantal)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Quantal)
     Importance: Low
         Status: New

** Affects: linux (Ubuntu Hardy)
     Importance: Low
         Status: New

** Affects: linux-armadaxp (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-ec2 (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-fsl-imx51 (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-maverick (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-natty (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-lts-backport-oneiric (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-mvl-dove (Ubuntu Hardy)
     Importance: Low
         Status: Invalid

** Affects: linux-ti-omap4 (Ubuntu Hardy)
     Importance: Low
         Status: Invalid


** Tags: kernel-cve-tracking-bug

** Tags added: kernel-cve-tracking-bug

** This bug has been flagged as a security vulnerability

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-2373

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1002503

Title:
  CVE-2012-2373

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1002503/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to