Description
mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-4102 | mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call. |
Ubuntu USN |
USN-2334-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2335-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2336-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2337-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:04:28.804Z
Reserved: 2014-06-17T00:00:00.000Z
Link: CVE-2014-4171
No data.
Status : Modified
Published: 2014-06-23T11:21:20.403
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-4171
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN