fs/overlayfs/copy_up.c in the Linux kernel before 4.2.6 uses an incorrect cleanup code path, which allows local users to cause a denial of service (dentry reference leak) via filesystem operations on a large file in a lower overlayfs layer.
                
            References
                    | Link | Resource | 
|---|---|
| http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ab79efab0a0ba01a74df782eb7fa44b044dae8b5 | Exploit Patch Vendor Advisory | 
| https://bugzilla.redhat.com/show_bug.cgi?id=1367814 | Issue Tracking Third Party Advisory VDB Entry | 
| https://github.com/torvalds/linux/commit/ab79efab0a0ba01a74df782eb7fa44b044dae8b5 | Patch | 
| http://www.openwall.com/lists/oss-security/2016/08/23/9 | Exploit Third Party Advisory | 
| http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.6 | Release Notes Vendor Advisory | 
| http://www.securityfocus.com/bid/92611 | 
Configurations
                    Information
                Published : 2016-10-16 14:59
Updated : 2016-11-28 11:50
NVD link : CVE-2015-8953
Mitre link : CVE-2015-8953
JSON object : View
CWE
                
                    
                        
                        CWE-399
                        
            Resource Management Errors
Products Affected
                linux
- linux_kernel
 


