** Changed in: linux (Ubuntu Utopic)
       Status: New => Fix Committed

** Description changed:

  mm/shmem.c in the Linux kernel through 3.15.1 does not properly
  implement the interaction between range notification and hole punching,
  which allows local users to cause a denial of service (i_mutex hold) by
  using the mmap system call to access a hole, as demonstrated by
  interfering with intended shmem activity by blocking completion of (1)
  an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate
  call.
+ 
+ Break-Fix: - f00cdc6df7d7cfcabb5b740911e6788cb0802bdb
+ Break-Fix: - 8e205f779d1443a94b5ae81aa359cb535dd3021e
+ Break-Fix: - b1a366500bd537b50c3aad26dc7df083ec03a448

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1333617

Title:
  CVE-2014-4171

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1333617/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to