** Changed in: linux-lts-trusty (Ubuntu Precise)
       Status: New => Fix Committed

** Changed in: linux (Ubuntu Precise)
       Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
       Status: New => Fix Committed

** Description changed:

- splice: lack of generic write checks
+ The implementation of certain splice_write file operations in the Linux
+ kernel before 3.16 does not enforce a restriction on the maximum size of
+ a single file, which allows local users to cause a denial of service
+ (system crash) or possibly have unspecified other impact via a crafted
+ splice system call, as demonstrated by use of a file descriptor
+ associated with an ext4 filesystem.
  
  Break-Fix: - 8d0207652cbe27d1f962050737848e5ad4671958

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1416498

Title:
  CVE-2014-7822

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1416498/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to