CVE-2015-8952

The mbcache feature in the ext2 and ext4 filesystem implementations in the Linux kernel before 4.6 mishandles xattr block caching, which allows local users to cause a denial of service (soft lockup) via filesystem operations in environments that use many attributes, as demonstrated by Ceph and Samba.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=82939d7999dfc1f1998c4b1c12e2f19edbdff272 Patch
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=be0726d33cb8f411945884664924bed3cb8c70ee Patch
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9a61eb4e2471c56a63cd804c7474128138c38ac Patch
http://www.openwall.com/lists/oss-security/2016/08/22/2 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/08/25/4 Patch Third Party Advisory
https://bugzilla.kernel.org/show_bug.cgi?id=107301 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1360968 Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/82939d7999dfc1f1998c4b1c12e2f19edbdff272 Vendor Advisory
https://github.com/torvalds/linux/commit/be0726d33cb8f411945884664924bed3cb8c70ee Issue Tracking Patch
https://github.com/torvalds/linux/commit/f9a61eb4e2471c56a63cd804c7474128138c38ac Issue Tracking
https://lwn.net/Articles/668718/ Third Party Advisory
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=82939d7999dfc1f1998c4b1c12e2f19edbdff272 Patch
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=be0726d33cb8f411945884664924bed3cb8c70ee Patch
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9a61eb4e2471c56a63cd804c7474128138c38ac Patch
http://www.openwall.com/lists/oss-security/2016/08/22/2 Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/08/25/4 Patch Third Party Advisory
https://bugzilla.kernel.org/show_bug.cgi?id=107301 Issue Tracking Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1360968 Issue Tracking Third Party Advisory VDB Entry
https://github.com/torvalds/linux/commit/82939d7999dfc1f1998c4b1c12e2f19edbdff272 Vendor Advisory
https://github.com/torvalds/linux/commit/be0726d33cb8f411945884664924bed3cb8c70ee Issue Tracking Patch
https://github.com/torvalds/linux/commit/f9a61eb4e2471c56a63cd804c7474128138c38ac Issue Tracking
https://lwn.net/Articles/668718/ Third Party Advisory
https://usn.ubuntu.com/3582-1/
https://usn.ubuntu.com/3582-2/
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:39

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=82939d7999dfc1f1998c4b1c12e2f19edbdff272 - Patch () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=82939d7999dfc1f1998c4b1c12e2f19edbdff272 - Patch
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=be0726d33cb8f411945884664924bed3cb8c70ee - Patch () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=be0726d33cb8f411945884664924bed3cb8c70ee - Patch
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9a61eb4e2471c56a63cd804c7474128138c38ac - Patch () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9a61eb4e2471c56a63cd804c7474128138c38ac - Patch
References () http://www.openwall.com/lists/oss-security/2016/08/22/2 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/08/22/2 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2016/08/25/4 - Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2016/08/25/4 - Patch, Third Party Advisory
References () https://bugzilla.kernel.org/show_bug.cgi?id=107301 - Issue Tracking, Third Party Advisory () https://bugzilla.kernel.org/show_bug.cgi?id=107301 - Issue Tracking, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=1360968 - Issue Tracking, Third Party Advisory, VDB Entry () https://bugzilla.redhat.com/show_bug.cgi?id=1360968 - Issue Tracking, Third Party Advisory, VDB Entry
References () https://github.com/torvalds/linux/commit/82939d7999dfc1f1998c4b1c12e2f19edbdff272 - Vendor Advisory () https://github.com/torvalds/linux/commit/82939d7999dfc1f1998c4b1c12e2f19edbdff272 - Vendor Advisory
References () https://github.com/torvalds/linux/commit/be0726d33cb8f411945884664924bed3cb8c70ee - Issue Tracking, Patch () https://github.com/torvalds/linux/commit/be0726d33cb8f411945884664924bed3cb8c70ee - Issue Tracking, Patch
References () https://github.com/torvalds/linux/commit/f9a61eb4e2471c56a63cd804c7474128138c38ac - Issue Tracking () https://github.com/torvalds/linux/commit/f9a61eb4e2471c56a63cd804c7474128138c38ac - Issue Tracking
References () https://lwn.net/Articles/668718/ - Third Party Advisory () https://lwn.net/Articles/668718/ - Third Party Advisory
References () https://usn.ubuntu.com/3582-1/ - () https://usn.ubuntu.com/3582-1/ -
References () https://usn.ubuntu.com/3582-2/ - () https://usn.ubuntu.com/3582-2/ -

Information

Published : 2016-10-16 21:59

Updated : 2024-11-21 02:39


NVD link : CVE-2015-8952

Mitre link : CVE-2015-8952

CVE.ORG link : CVE-2015-8952


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-19

Data Processing Errors