Bug 1094299 (CVE-2014-1737, CVE-2014-1738)
Summary: | CVE-2014-1737 CVE-2014-1738 kernel: block: floppy: privilege escalation via FDRAWCMD floppy ioctl command | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | agordeev, aquini, bhu, carnil, dhoward, esammons, fhrbata, iboverma, jkacur, jkurik, jross, kernel-mgr, lgoncalv, lwang, matt, mcressma, nobody, npajkovs, pholasek, plougher, rvrbovsk, security-response-team, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A flaw was found in the way the Linux kernel's floppy driver handled user space provided data in certain error code paths while processing FDRAWCMD IOCTL commands. A local user with write access to /dev/fdX could use this flaw to free (using the kfree() function) arbitrary kernel memory. (CVE-2014-1737, Important)
It was found that the Linux kernel's floppy driver leaked internal kernel memory addresses to user space during the processing of the FDRAWCMD IOCTL command. A local user with write access to /dev/fdX could use this flaw to obtain information about the kernel heap arrangement. (CVE-2014-1738, Low)
Note: A local user with write access to /dev/fdX could use these two flaws (CVE-2014-1737 in combination with CVE-2014-1738) to escalate their privileges on the system.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2014-07-17 05:33:46 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1094302, 1094303, 1094304, 1094306, 1094308, 1094310, 1094311, 1094312, 1094313, 1094314, 1094315, 1094316, 1094318, 1096195 | ||
Bug Blocks: | 1094326 |
Description
Petr Matousek
2014-05-05 12:56:28 UTC
Upstream patches: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2145e15e0557a01b9195d1c7199a1b92cb9be81f Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1096195] kernel-3.14.4-200.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. kernel-3.14.4-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0557 https://rhn.redhat.com/errata/RHSA-2014-0557.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0740 https://rhn.redhat.com/errata/RHSA-2014-0740.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0771 https://rhn.redhat.com/errata/RHSA-2014-0771.html This issue has been addressed in following products: Red Hat Enterprise Linux 5.9 EUS - Server Only Via RHSA-2014:0772 https://rhn.redhat.com/errata/RHSA-2014-0772.html This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0786 https://rhn.redhat.com/errata/RHSA-2014-0786.html This issue has been addressed in following products: Red Hat Enterprise Linux 6.2 AUS Via RHSA-2014:0800 https://rhn.redhat.com/errata/RHSA-2014-0800.html This issue has been addressed in following products: Red Hat Enterprise Linux 5.6 Long Life Via RHSA-2014:0801 https://rhn.redhat.com/errata/RHSA-2014-0801.html IssueDescription CVE-2014-1737: A flaw was found in the way the Linux kernel's floppy driver handled user space provided data in certain error code paths while processing FDRAWCMD IOCTL commands. A local user with write access to /dev/fdX could use this flaw to free (using the kfree() function) arbitrary kernel memory. Note: A local user with write access to /dev/fdX could use CVE-2014-1737 in combination with CVE-2014-1738 to escalate their privileges on the system. IssueDescription CVE-2014-1738: It was found that the Linux kernel's floppy driver leaked internal kernel memory addresses to user space during the processing of the FDRAWCMD IOCTL command. A local user with write access to /dev/fdX could use this flaw to obtain information about the kernel heap arrangement. Note: A local user with write access to /dev/fdX could use CVE-2014-1737 in combination with CVE-2014-1738 to escalate their privileges on the system. This issue has been addressed in following products: Red Hat Enterprise Linux 6.4 EUS - Server and Compute Node Only Via RHSA-2014:0900 https://rhn.redhat.com/errata/RHSA-2014-0900.html Statement: (none) |