** Changed in: linux-armadaxp (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux (Ubuntu Lucid)
Status: New => Invalid
** Changed in: linux (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu Quantal)
Status: New => Invalid
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Invalid
** Description changed:
The arch_dup_task_struct function in the Transactional Memory (TM)
implementation in arch/powerpc/kernel/process.c in the Linux kernel
before 3.13.7 on the powerpc platform does not properly interact with
the clone and fork system calls, which allows local users to cause a
denial of service (Program Check and system crash) via certain
instructions that are executed with the processor in the Transactional
state.
- Break-Fix: - 621b5060e823301d0cba4cb52a7ee3491922d291
+ Break-Fix: fb09692e71f13af7298eb603a1975850b1c7a8d8
+ 621b5060e823301d0cba4cb52a7ee3491922d291
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302219
Title:
CVE-2014-2673
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302219/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs