CVE-2014-8086
low-risk
Published 2014-10-13
Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (2)
References (22)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0290.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0694.html
Third Party Advisory
http://www.securityfocus.com/bid/70376
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1151353
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/96922
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0290.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0694.html
Third Party Advisory
http://www.securityfocus.com/bid/70376
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1151353
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/96922
and 2 more references
19
/ 100
low-risk
Severity
12/34 · Low
Exploitability
0/34 · Minimal
Exposure
7/34 · Low