CVE-2014-8086

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.

References

http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html

http://rhn.redhat.com/errata/RHSA-2015-0290.html

http://rhn.redhat.com/errata/RHSA-2015-0694.html

http://www.openwall.com/lists/oss-security/2014/10/09/25

http://www.securityfocus.com/bid/70376

http://www.spinics.net/lists/linux-ext4/msg45683.html

http://www.spinics.net/lists/linux-ext4/msg45685.html

https://bugzilla.redhat.com/show_bug.cgi?id=1151353

https://exchange.xforce.ibmcloud.com/vulnerabilities/96922

https://lkml.org/lkml/2014/10/8/545

https://lkml.org/lkml/2014/10/9/129

Details

Source: MITRE

Published: 2014-10-13

Updated: 2020-08-14

Type: CWE-362

Risk Information

CVSS v2

Base Score: 4.7

Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.4

Severity: MEDIUM

CVSS v3

Base Score: 4.7

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

Impact Score: 3.6

Exploitability Score: 1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 3.17 (inclusive)

Configuration 2

OR

cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp2:*:*:ltss:*:*:*

Tenable Plugins

View all (16 total)

IDNameProductFamilySeverity
124808EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1484)NessusHuawei Local Security Checks
critical
124807EulerOS Virtualization 3.0.1.0 : kernel (EulerOS-SA-2019-1483)NessusHuawei Local Security Checks
high
85764SUSE SLES11 Security Update : kernel (SUSE-SU-2015:1478-1)NessusSuSE Local Security Checks
medium
84545SUSE SLED11 / SLES11 Security Update : kernel (SUSE-SU-2015:1174-1)NessusSuSE Local Security Checks
medium
84227SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2015:1071-1)NessusSuSE Local Security Checks
medium
82254Scientific Linux Security Update : kernel on SL7.x x86_64 (20150305)NessusScientific Linux Local Security Checks
high
81905RHEL 6 : MRG (RHSA-2015:0694)NessusRed Hat Local Security Checks
medium
81885CentOS 7 : kernel (CESA-2015:0290)NessusCentOS Local Security Checks
high
81800Oracle Linux 7 : kernel (ELSA-2015-0290)NessusOracle Linux Local Security Checks
high
81626RHEL 7 : kernel (RHSA-2015:0290)NessusRed Hat Local Security Checks
high
80168Ubuntu 14.10 : linux regression (USN-2448-2)NessusUbuntu Local Security Checks
high
80167Ubuntu 14.04 LTS : linux-lts-utopic regression (USN-2447-2)NessusUbuntu Local Security Checks
high
80034Ubuntu 14.10 : linux vulnerabilities (USN-2448-1)NessusUbuntu Local Security Checks
high
80033Ubuntu 14.04 LTS : linux-lts-utopic vulnerabilities (USN-2447-1)NessusUbuntu Local Security Checks
high
78715Fedora 20 : kernel-3.16.6-202.fc20 (2014-13558)NessusFedora Local Security Checks
high
78610Fedora 21 : kernel-3.17.1-302.fc21 (2014-13222)NessusFedora Local Security Checks
medium