The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1976.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-1978.html Third Party Advisory
http://secunia.com/advisories/62801 Broken Link
http://www.debian.org/security/2015/dsa-3170 Exploit Patch Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/10/30/7 Mailing List Third Party Advisory
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html Third Party Advisory
http://www.securityfocus.com/bid/70854 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034051 Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-2492-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2493-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2515-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2516-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2517-1 Third Party Advisory
http://www.ubuntu.com/usn/USN-2518-1 Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1159313 Issue Tracking Patch Third Party Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=946e51f2bf37f1656916eb75bd0742ba33983c28 Mailing List Patch Vendor Advisory
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ca5358ef75fc69fee5322a38a340f5739d997c10 Mailing List Patch Vendor Advisory
https://lkml.org/lkml/2014/10/25/171 Exploit Mailing List Third Party Advisory
https://lkml.org/lkml/2014/10/25/179 Mailing List Patch Third Party Advisory
https://lkml.org/lkml/2014/10/25/180 Mailing List Patch Third Party Advisory
https://lkml.org/lkml/2014/10/26/101 Mailing List Third Party Advisory
https://lkml.org/lkml/2014/10/26/116 Exploit Mailing List Third Party Advisory
https://lkml.org/lkml/2014/10/26/128 Mailing List Third Party Advisory
https://lkml.org/lkml/2014/10/26/129 Mailing List Third Party Advisory
https://support.f5.com/csp/article/K05211147 Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2014-11-10T11:00:00

Updated: 2019-04-08T19:06:05

Reserved: 2014-10-30T00:00:00


Link: CVE-2014-8559

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2014-11-10T11:55:09.813

Modified: 2020-08-13T17:42:43.860


Link: CVE-2014-8559

JSON object: View

cve-icon Redhat Information

No data.

CWE