lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 24 Aug 2009 11:11:31 +1000 (EST)
From: James Morris <jmorris@...ei.org>
To: linux-kernel@...r.kernel.org
cc: Andrew Morton <akpm@...ux-foundation.org>,
Stefan Huber <shuber2@...il.com>,
Peter Meerwald <pmeerw@...y.sbg.ac.at>
Subject: [PATCH] mm: fix hugetlb bug due to user_shm_unlock call (fwd)
---------- Forwarded message ----------
Date: Sun, 23 Aug 2009 11:03:11 +0200
From: Stefan Huber <shuber2@...il.com>
To: William Irwin <wli@...omorphy.com>
Cc: James Morris <jmorris@...ei.org>, Peter Meerwald <pmeerw@...y.sbg.ac.at>
Subject: [PATCH] mm: fix hugetlb bug due to user_shm_unlock call
This is a multi-part message in MIME format.
Dear maintainer!
We have recently detected a kernel oops bug in the hugetlb code. The bug
is still present in the current linux-2.6 git branch (tested until [1]).
We have attached a 'git format-patch'-file that solved problem for us.
The commit message should describe the logic of the bug. Please contact
me if you have further questions or comments.
Sincerely,
Stefan Huber.
[1] linux/kernel/git/torvalds/linux-2.6.git (commit
429966b8f644dda2afddb4f834a944e9b46a7645)
View attachment "0001-mm-fix-hugetlb-bug-due-to-user_shm_unlock-call.patch" of type "text/plain" (3037 bytes)
Powered by blists - more mailing lists