CVE-2014-0069

The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*

Configuration 3 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://article.gmane.org/gmane.linux.kernel.cifs/9401 - Broken Link () http://article.gmane.org/gmane.linux.kernel.cifs/9401 - Broken Link
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f - Broken Link () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html - Mailing List, Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2014-0328.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0328.html - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/02/17/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/02/17/4 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/65588 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/65588 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1064253 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1064253 - Issue Tracking, Third Party Advisory
References () https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/5d81de8e8667da7135d3a32a964087c0faf5483f - Patch, Third Party Advisory

05 Feb 2024, 19:51

Type Values Removed Values Added
References (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f - (MISC) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f - Broken Link

Information

Published : 2014-02-28 06:18

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0069

Mitre link : CVE-2014-0069

CVE.ORG link : CVE-2014-0069


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_server_aus
  • enterprise_linux_eus
  • enterprise_linux_server_tus
  • enterprise_linux_workstation

suse

  • linux_enterprise_server
  • linux_enterprise_desktop

linux

  • linux_kernel
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer