Medium severity5.5NVD Advisory· Published Jun 23, 2014· Updated May 6, 2026
CVE-2014-0203
CVE-2014-0203
Description
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
Affected products
3cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- github.com/torvalds/linux/commit/86acdca1b63e6890540fa19495cfc708beff3d8bnvdPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdExploitIssue TrackingPatchThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-0771.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-3043.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/68125nvdThird Party AdvisoryVDB Entry
- mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.33nvdBroken Link
- secunia.com/advisories/59262nvdBroken Link
- secunia.com/advisories/59309nvdBroken Link
- secunia.com/advisories/59406nvdBroken Link
- secunia.com/advisories/59560nvdBroken Link
News mentions
0No linked articles in our index yet.