Unrated severityNVD Advisory· Published Aug 1, 2014· Updated May 6, 2026
CVE-2014-5045
CVE-2014-5045
Description
The mountpoint_last function in fs/namei.c in the Linux kernel before 3.15.8 does not properly maintain a certain reference count during attempts to use the umount system call in conjunction with a symlink, which allows local users to cause a denial of service (memory consumption or use-after-free) or possibly have unspecified other impact via the umount program.
Affected products
4- cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.8nvdPatchThird Party AdvisoryVendor Advisory
- github.com/torvalds/linux/commit/295dc39d941dc2ae53d5c170365af4c9d5c16212nvdExploitPatchThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-0062.htmlnvdThird Party Advisory
- secunia.com/advisories/60353nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2014/07/24/2nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/68862nvdThird Party AdvisoryVDB Entry
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.