Race condition in the ext4_file_write_iter function in fs/ext4/file.c in the Linux kernel through 3.17 allows local users to cause a denial of service (file unavailability) via a combination of a write action and an F_SETFL fcntl operation for the O_DIRECT flag.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://lkml.org/lkml/2014/10/8/545 | mailing list third party advisory exploit |
http://www.securityfocus.com/bid/70376 | third party advisory vdb entry |
http://www.spinics.net/lists/linux-ext4/msg45685.html | patch mailing list third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1151353 | patch third party advisory issue tracking |
http://www.spinics.net/lists/linux-ext4/msg45683.html | mailing list third party advisory exploit |
http://rhn.redhat.com/errata/RHSA-2015-0694.html | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2015-0290.html | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html | vendor advisory mailing list third party advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/96922 | third party advisory vdb entry |
https://lkml.org/lkml/2014/10/9/129 | mailing list third party advisory exploit |
http://www.openwall.com/lists/oss-security/2014/10/09/25 | third party advisory mailing list |