Your submission was sent successfully! Close

CVE-2014-4171

Published: 23 June 2014

mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.

From the Ubuntu security team

Sasha Levin reported an issue with the Linux kernel's shared memory subsystem when used with range notifications and hole punching. A local user could exploit this flaw to cause a denial of service.

Priority

Medium

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by f00cdc6df7d7cfcabb5b740911e6788cb0802bdb
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 8e205f779d1443a94b5ae81aa359cb535dd3021e
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by b1a366500bd537b50c3aad26dc7df083ec03a448
linux-2.6
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc7)

Notes

AuthorNote
jdstrand
android kernels (goldfish, grouper, maguro, mako and manta) are not
supported on the Ubuntu Touch 13.10 preview kernels
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.04 preview kernels
henrix
discussion on stable kernels backport is still on-going, as the
fix is likely to be different.
apw
the break-fix is likely wrong now as they are reverting this commit in favour
of some other combo as well: break-fix: - f00cdc6df7d7cfcabb5b740911e6788cb0802bdb
jdstrand
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support

References

Bugs