** Changed in: linux (Ubuntu Utopic) Status: New => Fix Committed
** Description changed: mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call. + + Break-Fix: - f00cdc6df7d7cfcabb5b740911e6788cb0802bdb + Break-Fix: - 8e205f779d1443a94b5ae81aa359cb535dd3021e + Break-Fix: - b1a366500bd537b50c3aad26dc7df083ec03a448 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1333617 Title: CVE-2014-4171 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1333617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs