5.5
CVSSv3

CVE-2014-8559

Published: 10/11/2014 Updated: 13/08/2020
CVSS v2 Base Score: 4.9 | Impact Score: 6.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 437
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The d_walk function in fs/dcache.c in the Linux kernel up to and including 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 14.10

novell suse linux enterprise desktop 12.0

novell suse linux enterprise server 12.0

opensuse evergreen 11.4

opensuse opensuse 13.1

suse linux enterprise real time extension 11

suse linux enterprise software development kit 12

suse linux enterprise workstation extension 12

suse suse linux enterprise server 11

oracle linux 7

Vendor Advisories

Debian Bug report logs - #774155 linux: CVE-2014-9428: Remote crash of kernel via batman-adv module Package: linux; Maintainer for linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: conchur@webde Date: Mon, 29 Dec 2014 16:48:01 UTC Severity: important Tags: patch, security, upstream Found in versi ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leaks or privilege escalation CVE-2013-7421 / CVE-2014-9644 It was discovered that the Crypto API allowed unprivileged users to load arbitrary kernel modules A local user can use this flaw to exploit vulnerabilities ...
USN-2516-1 introduced a regression in the Linux kernel ...
Several security issues were fixed in the kernel ...
USN-2516-1 introduced a regression in the Linux kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
USN-2515-1 introduced a regression in the Linux kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
A flaw was found in the way the Linux kernel's VFS subsystem handled file system locks A local, unprivileged user could use this flaw to trigger a deadlock in the kernel, causing a denial of service on the system ...

References

CWE-400https://lkml.org/lkml/2014/10/25/180https://bugzilla.redhat.com/show_bug.cgi?id=1159313https://lkml.org/lkml/2014/10/26/129https://lkml.org/lkml/2014/10/25/171http://www.openwall.com/lists/oss-security/2014/10/30/7https://lkml.org/lkml/2014/10/26/116https://lkml.org/lkml/2014/10/26/128https://lkml.org/lkml/2014/10/26/101https://lkml.org/lkml/2014/10/25/179http://www.securityfocus.com/bid/70854http://secunia.com/advisories/62801http://www.ubuntu.com/usn/USN-2516-1http://www.ubuntu.com/usn/USN-2517-1http://www.ubuntu.com/usn/USN-2492-1http://www.ubuntu.com/usn/USN-2518-1http://www.ubuntu.com/usn/USN-2515-1http://www.ubuntu.com/usn/USN-2493-1http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.htmlhttp://www.debian.org/security/2015/dsa-3170http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1978.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1976.htmlhttp://www.securitytracker.com/id/1034051https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca5358ef75fc69fee5322a38a340f5739d997c10https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=946e51f2bf37f1656916eb75bd0742ba33983c28http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.htmlhttps://support.f5.com/csp/article/K05211147https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774155https://www.debian.org/security/./dsa-3170https://nvd.nist.govhttps://usn.ubuntu.com/2516-3/