** Description changed:

- With CLONE_IO, copy_io() increments both ioc->refcount and
- ioc->nr_tasks. However exit_io_context() only decrements ioc->refcount
- if ioc->nr_tasks reaches 0.  With CLONE_IO, parent's
- io_context->nr_tasks is incremented, but never decremented whenever
- copy_process() fails afterwards, which prevents exit_io_context() from
- calling IO schedulers exit functions. An unprivileged local user could
- use these flaws cause denial of service.
+ The I/O implementation for block devices in the Linux kernel before
+ 2.6.33 does not properly handle the CLONE_IO feature, which allows local
+ users to cause a denial of service (I/O instability) by starting
+ multiple processes that share an I/O context.
  
  Break-Fix: fadad878cc0640cc9cd5569998bf54b693f7b38b 
61cc74fbb87af6aa551a06a370590c9bc07e29d9
  Break-Fix: fadad878cc0640cc9cd5569998bf54b693f7b38b 
b69f2292063d2caf37ca9aec7d63ded203701bf3

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/940743

Title:
  CVE-2012-0879

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/940743/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to