Bug 1180119 (CVE-2014-9584)

Summary: CVE-2014-9584 kernel: isofs: unchecked printing of ER records
Product: [Other] Security Response Reporter: Vasyl Kaigorodov <vkaigoro>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: agordeev, aquini, bhu, ccoleman, dhoward, dmcphers, esammons, fhrbata, Frodox, gansalmon, iboverma, itamar, jforbes, jialiu, jkacur, joelsmith, jokerman, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, kseifried, lgoncalv, lmeyer, lwang, madhu.chinakonda, matt, mchehab, mcressma, mguzik, mmccomas, mmcgrath, nmurray, pholasek, plougher, pmatouse, ppandit, rt-maint, rvrbovsk, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records. An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory.
Story Points: ---
Clone Of: Environment:
Last Closed: 2015-06-23 12:17:22 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1180480, 1180481, 1180482, 1180483, 1180485, 1180492, 1223793, 1223794    
Bug Blocks: 1176102    

Description Vasyl Kaigorodov 2015-01-08 12:09:46 UTC
Linux kernel built with the iso9660 file system(CONFIG_ISO9660_FS) support is vulnerable to an information leakage flaw. This could occur while accessing data on an iso9660 image with RockRidge extension reference(ER) records.

An unprivileged user/process could use this flaw to leak (=~255)kernel memory bytes.

Upstream fix:
-------------
  -> https://git.kernel.org/linus/4e2024624e678f0ebb916e6192bd23c1f9fdf696

Comment 1 Prasad Pandit 2015-01-09 09:53:48 UTC
Statement:

This issue affects the versions of the Linux kernel as shipped with
Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for the respective releases may address this issue.

Red Hat Enterprise Linux 5 is now in Production 3 phase of the support and maintenance life cycle. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 3 Prasad Pandit 2015-01-09 10:01:26 UTC
Acknowledgements:

Red Hat would like to thank Carl Henrik Lunde for reporting this issue.

Comment 5 Prasad Pandit 2015-01-09 10:07:47 UTC
Created kernel tracking bugs for this issue

Affects: fedora-all [bug 1180480]

Comment 6 errata-xmlrpc 2015-04-21 15:02:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2015:0864 https://rhn.redhat.com/errata/RHSA-2015-0864.html

Comment 8 errata-xmlrpc 2015-06-23 08:25:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:1139 https://rhn.redhat.com/errata/RHSA-2015-1139.html

Comment 9 errata-xmlrpc 2015-06-23 08:28:39 UTC
This issue has been addressed in the following products:

  MRG for RHEL-6 v.2

Via RHSA-2015:1138 https://rhn.redhat.com/errata/RHSA-2015-1138.html

Comment 10 errata-xmlrpc 2015-06-23 08:47:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:1137 https://rhn.redhat.com/errata/RHSA-2015-1137.html