Medium severity5.5NVD Advisory· Published Nov 10, 2014· Updated May 6, 2026
CVE-2014-8559
CVE-2014-8559
Description
The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
Affected products
13cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
31- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdMailing ListPatchVendor Advisory
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdMailing ListPatchVendor Advisory
- lkml.org/lkml/2014/10/25/179nvdMailing ListPatchThird Party Advisory
- lkml.org/lkml/2014/10/25/180nvdMailing ListPatchThird Party Advisory
- www.debian.org/security/2015/dsa-3170nvdExploitPatchThird Party Advisory
- lkml.org/lkml/2014/10/25/171nvdExploitMailing ListThird Party Advisory
- lkml.org/lkml/2014/10/26/116nvdExploitMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-01/msg00035.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1976.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1978.htmlnvdThird Party Advisory
- www.openwall.com/lists/oss-security/2014/10/30/7nvdMailing ListThird Party Advisory
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/70854nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1034051nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2492-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2493-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2515-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2516-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2517-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2518-1nvdThird Party Advisory
- lkml.org/lkml/2014/10/26/101nvdMailing ListThird Party Advisory
- lkml.org/lkml/2014/10/26/128nvdMailing ListThird Party Advisory
- lkml.org/lkml/2014/10/26/129nvdMailing ListThird Party Advisory
- support.f5.com/csp/article/K05211147nvdThird Party Advisory
- secunia.com/advisories/62801nvdBroken Link
News mentions
0No linked articles in our index yet.