ACK+Applied: [PATCH 0/2][CVE-2016-4794][vivid, xenial] Use-after-free vulnerability in mm/percpu.c

Kamal Mostafa kamal at canonical.com
Tue Jul 12 21:14:16 UTC 2016


On Tue, Jul 12, 2016 at 05:03:14PM +0100, Luis Henriques wrote:
> Following this email I'm sending 2 patches (clean cherry-picks) that fix
> CVE-2016-4794 for vivid and xenial.  Earlier kernels are not impacted by this
> issue.

Applied to V and X.

 -Kamal

> 
> Tejun Heo (2):
>   percpu: fix synchronization between chunk->map_extend_work and chunk
>     destruction
>   percpu: fix synchronization between synchronous map extension and
>     chunk destruction
> 
>  mm/percpu.c | 73 +++++++++++++++++++++++++++++++++++++------------------------
>  1 file changed, 44 insertions(+), 29 deletions(-)
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team




More information about the kernel-team mailing list