Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-1737

Опубликовано: 07 мая 2014
Источник: redhat
CVSS2: 6.6

Описание

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.

A flaw was found in the way the Linux kernel's floppy driver handled user space provided data in certain error code paths while processing FDRAWCMD IOCTL commands. A local user with write access to /dev/fdX could use this flaw to free (using the kfree() function) arbitrary kernel memory. (CVE-2014-1737, Important) It was found that the Linux kernel's floppy driver leaked internal kernel memory addresses to user space during the processing of the FDRAWCMD IOCTL command. A local user with write access to /dev/fdX could use this flaw to obtain information about the kernel heap arrangement. (CVE-2014-1738, Low) Note: A local user with write access to /dev/fdX could use these two flaws (CVE-2014-1737 in combination with CVE-2014-1738) to escalate their privileges on the system.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6kernelAffected
Red Hat Enterprise Linux Extended Update Support 6.3kernelAffected
Red Hat Enterprise Linux 5kernelFixedRHSA-2014:074010.06.2014
Red Hat Enterprise Linux 5.6 Long LifekernelFixedRHSA-2014:080126.06.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportkernelFixedRHSA-2014:077219.06.2014
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:077119.06.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2014:080026.06.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:090017.07.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:078624.06.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:055727.05.2014

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1094299kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command

6.6 Medium

CVSS2

Связанные уязвимости

ubuntu
около 11 лет назад

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.

nvd
около 11 лет назад

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.

debian
около 11 лет назад

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux ker ...

github
около 3 лет назад

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.

fstec
около 11 лет назад

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

6.6 Medium

CVSS2