Hide Forgot
Linux kernel built with the shared memory support is vulnerable to a denial of service flaw caused by a race condition in mmap access to a hole, while it is punched from shmem and madvise(2) & fallocate(2) calls. In that mmap access could prevent the other calls from completing. A user/process could use this flaw to cause a DoS. Upstream fixes: ------------- -> https://git.kernel.org/linus/f00cdc6df7d7cfcabb5b740911e6788cb0802bdb -> https://git.kernel.org/linus/8e205f779d1443a94b5ae81aa359cb535dd3021e -> https://git.kernel.org/linus/b1a366500bd537b50c3aad26dc7df083ec03a448 Reference: ---------- -> http://www.openwall.com/lists/oss-security/2014/06/18/11
Statement: This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. This issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1118247]
kernel-3.15.7-200.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.14.15-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2014:1318 https://rhn.redhat.com/errata/RHSA-2014-1318.html
IssueDescription: A race condition flaw was found in the way the Linux kernel's mmap(2), madvise(2), and fallocate(2) system calls interacted with each other while operating on virtual memory file system files. A local user could use this flaw to cause a denial of service.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:0102 https://rhn.redhat.com/errata/RHSA-2015-0102.html