fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab79efab0a0ba01a74df782eb7fa44b044dae8b5 | Exploit Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1367814 | Issue Tracking Third Party Advisory VDB Entry |
https://github.com/torvalds/linux/commit/ab79efab0a0ba01a74df782eb7fa44b044dae8b5 | Patch |
http://www.openwall.com/lists/oss-security/2016/08/23/9 | Exploit Third Party Advisory |
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.6 | Release Notes Vendor Advisory |
http://www.securityfocus.com/bid/92611 |
Configurations
Information
Published : 2016-10-16 14:59
Updated : 2016-11-28 11:50
NVD link : CVE-2015-8953
Mitre link : CVE-2015-8953
JSON object : View
CWE
CWE-399
Resource Management Errors
Products Affected
linux
- linux_kernel