Published: 24 April 2012
Use-after-free vulnerability in the Linux kernel before 3.3.6, when huge pages are enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges by interacting with a hugetlbfs filesystem, as demonstrated by a umount operation that triggers improper handling of quota data.
From the Ubuntu security team
Schacher Raindel discovered a flaw in the Linux kernel's memory handling when hugetlb is enabled. An unprivileged local attacker could exploit this flaw to cause a denial of service and potentially gain higher privileges.
linux-armadaxp is maintained by OEM
"The bug exists in kernel versions 2.6.24 and above."
move none tracking bug to notes to stop the scripts from complaining https://bugs.launchpad.net/ubuntu/+source/linux/+bug/987107