First published: Fri Oct 31 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Linux Kernel | <=3.17.2 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
SUSE Linux Enterprise Desktop | =12.0 | |
SUSE Linux Enterprise Server | =12.0 | |
openSUSE Evergreen | =11.4 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Workstation Extension | =12 | |
SUSE Linux Enterprise Server | =11-sp2 | |
Oracle Linux | =7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8559 is classified as a critical vulnerability because it can lead to a denial of service (DoS) condition.
To mitigate CVE-2014-8559, upgrade to a patched version of the Linux kernel, specifically versions 5.10.223-1, 5.10.226-1, 6.1.123-1, or later.
CVE-2014-8559 affects various distributions including Linux Kernel versions up to 3.17.2, Ubuntu 12.04, 14.04, 14.10, and specific versions of SUSE and Oracle Linux.
If exploited, CVE-2014-8559 allows an unprivileged user to cause a system-wide deadlock, making the system unusable.
CVE-2014-8559 was identified and published on October 25, 2014.