ghsa-vmrj-8qgc-5x6c
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Details

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2014-1737"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-754"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2014-05-11T21:55:00Z",
    "severity": "HIGH"
  },
  "details": "The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.",
  "id": "GHSA-vmrj-8qgc-5x6c",
  "modified": "2022-05-13T01:23:11Z",
  "published": "2022-05-13T01:23:11Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1737"
    },
    {
      "type": "WEB",
      "url": "https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094299"
    },
    {
      "type": "WEB",
      "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c"
    },
    {
      "type": "WEB",
      "url": "http://linux.oracle.com/errata/ELSA-2014-0771.html"
    },
    {
      "type": "WEB",
      "url": "http://linux.oracle.com/errata/ELSA-2014-3043.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html"
    },
    {
      "type": "WEB",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html"
    },
    {
      "type": "WEB",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0800.html"
    },
    {
      "type": "WEB",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0801.html"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/59262"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/59309"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/59406"
    },
    {
      "type": "WEB",
      "url": "http://secunia.com/advisories/59599"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2014/dsa-2926"
    },
    {
      "type": "WEB",
      "url": "http://www.debian.org/security/2014/dsa-2928"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2014/05/09/2"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/67300"
    },
    {
      "type": "WEB",
      "url": "http://www.securitytracker.com/id/1030474"
    }
  ],
  "schema_version": "1.4.0",
  "severity": []
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...