SRU request for LP#137978 (6.0.6 LTS)
tim.gardner at canonical.com
Thu Sep 4 02:14:30 UTC 2008
Colin Ian King wrote:
> SRU Justification:
> Impact: Running wine applications from a FAT filesystem causes the wine
> process to get stuck in a kernel "D" state and cannot be killed. This
> prevents a user from unmounting the FAT filesystem.
> Fix: Replace a typo in fat_ioctl_readdir() introduced during
> CVE-2007-2878, where the second semaphore down() should in fact be an
> Testcase: Without the patch one can trip the bug by:
> 1. Mount any FAT filesystem
> 2. Copy some file.exe file to it.
> 3. Run: wine /media/fattest/file.exe
> 4. Wine hangs and cannot be killed.
> With the patch, this works. This has been tested by myself on a cleanly
> installed 6.0.6 LTS i386 Desktop version inside VirtualBox, see note:
> Patch attached.
ACK - can't beat that for simplicity.
Tim Gardner tim.gardner at canonical.com
More information about the kernel-team