Race condition in Linux kernel - CVE-2015-8839

 

Race condition in Linux kernel - CVE-2015-8839

Published: May 2, 2016 / Updated: October 2, 2020


Vulnerability identifier: #VU91494
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2015-8839
CWE-ID: CWE-362
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the init_once() function in fs/ext4/super.c, within the ext4_punch_hole(), ext4_setattr(), ext4_page_mkwrite() and block_page_mkwrite_return() functions in fs/ext4/inode.c, within the ext4_dax_fault() and ext4_dax_pmd_fault() functions in fs/ext4/file.c, within the ext4_zero_range(), ext4_collapse_range() and ext4_insert_range() functions in fs/ext4/extents.c. A local non-authenticated attacker can perform a denial of service (DoS) attack.


How to mitigate CVE-2015-8839

Install update from vendor's website.

Sources