Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1093076 - (CVE-2014-3122) CVE-2014-3122 Kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
CVE-2014-3122 Kernel: mm: try_to_unmap_cluster() should lock_page() before ml...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20130319,repor...
: Security
Depends On: 1078349 1092365 1093080 1093081 1093082 1093083 1093084
Blocks: 1092565
  Show dependency treegraph
 
Reported: 2014-04-30 10:36 EDT by Prasad J Pandit
Modified: 2016-02-10 02:27 EST (History)
31 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
It was found that the try_to_unmap_cluster() function in the Linux kernel's Memory Managment subsystem did not properly handle page locking in certain cases, which could potentially trigger the BUG_ON() macro in the mlock_vma_page() function. A local, unprivileged user could use this flaw to crash the system.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2016-02-10 02:27:47 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2014:0557 normal SHIPPED_LIVE Important: kernel-rt security update 2014-05-27 16:25:52 EDT
Red Hat Product Errata RHSA-2014:1392 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2014-10-13 21:28:44 EDT

  None (edit)
Description Prasad J Pandit 2014-04-30 10:36:10 EDT
Linux kernel kernel's Memory Management subsystem is vulnerable to a crash
caused by unlocked memory pages. It could occur during the memory page
migration or while cleaning the swap cache pages.

An unprivileged user/program could use this flaw to crash the system kernel,
resulting in DoS.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/57e68e9cd65b4b8eb4045a1e0d0746458502554c
Comment 1 Prasad J Pandit 2014-04-30 10:45:33 EDT
Statement:

This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.

This issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6. Future kernel updates for Red Hat Enterprise Linux 6 may address this issue.
Comment 4 Prasad J Pandit 2014-04-30 10:51:15 EDT
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1093084]
Comment 5 Fedora Update System 2014-05-09 23:21:07 EDT
kernel-3.14.3-200.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 6 Fedora Update System 2014-05-21 19:22:41 EDT
kernel-3.14.4-100.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 7 errata-xmlrpc 2014-05-27 12:28:13 EDT
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2014:0557 https://rhn.redhat.com/errata/RHSA-2014-0557.html
Comment 8 Martin Prpič 2014-10-07 05:19:08 EDT
IssueDescription:

It was found that the try_to_unmap_cluster() function in the Linux kernel's Memory Managment subsystem did not properly handle page locking in certain cases, which could potentially trigger the BUG_ON() macro in the mlock_vma_page() function. A local, unprivileged user could use this flaw to crash the system.
Comment 9 errata-xmlrpc 2014-10-14 02:06:31 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:1392 https://rhn.redhat.com/errata/RHSA-2014-1392.html

Note You need to log in before you can comment on or make changes to this bug.