It was found that the parse_rock_ridge_inode_internal() function of the Linux kernel's ISOFS implementation did not correctly check relocated directories when processing Rock Ridge child link (CL) tags. An attacker with physical access to the system could use a specially crafted ISO image to crash the system or, potentially, escalate their privileges on the system. Upstream fix: ------------ -> https://git.kernel.org/linus/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 CVE request: ------------ -> http://seclists.org/oss-sec/2014/q3/450
MITRE assigned two CVE numbers, CVE-2014-5471 and CVE-2014-5472, for this issue. More details here: http://seclists.org/oss-sec/2014/q3/452
Fedora has patched this on all relevant branches now.
kernel-3.15.10-201.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 5 may address this issue.
kernel-3.16.2-300.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: MRG for RHEL-6 v.2 Via RHSA-2014:1318 https://rhn.redhat.com/errata/RHSA-2014-1318.html
kernel-3.14.19-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
IssueDescription CVE-2014-5472: It was found that the parse_rock_ridge_inode_internal() function of the Linux kernel's ISOFS implementation did not correctly check relocated directories when processing Rock Ridge child link (CL) tags. An attacker with physical access to the system could use a specially crafted ISO image to crash the system or, potentially, escalate their privileges on the system. IssueDescription CVE-2014-5471: It was found that the parse_rock_ridge_inode_internal() function of the Linux kernel's ISOFS implementation did not correctly check relocated directories when processing Rock Ridge child link (CL) tags. An attacker with physical access to the system could use a specially crafted ISO image to crash the system or, potentially, escalate their privileges on the system.
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2014:1997 https://rhn.redhat.com/errata/RHSA-2014-1997.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2015:0102 https://rhn.redhat.com/errata/RHSA-2015-0102.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.2 AUS Via RHSA-2015:0695 https://rhn.redhat.com/errata/RHSA-2015-0695.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 EUS - Server and Compute Node Only Via RHSA-2015:0782 https://rhn.redhat.com/errata/RHSA-2015-0782.html
This issue has been addressed in the following products: Red Hat Enterprise Linux 6.4 AUS - Server Only Via RHSA-2015:0803 https://rhn.redhat.com/errata/RHSA-2015-0803.html