ghsa-vmrj-8qgc-5x6c
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Details
The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
{ "affected": [], "aliases": [ "CVE-2014-1737" ], "database_specific": { "cwe_ids": [ "CWE-754" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-05-11T21:55:00Z", "severity": "HIGH" }, "details": "The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.", "id": "GHSA-vmrj-8qgc-5x6c", "modified": "2022-05-13T01:23:11Z", "published": "2022-05-13T01:23:11Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1737" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1094299" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-0771.html" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-3043.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0800.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-0801.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/59262" }, { "type": "WEB", "url": "http://secunia.com/advisories/59309" }, { "type": "WEB", "url": "http://secunia.com/advisories/59406" }, { "type": "WEB", "url": "http://secunia.com/advisories/59599" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2926" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-2928" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/05/09/2" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/67300" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1030474" } ], "schema_version": "1.4.0", "severity": [] }
Loading...