CVE-2014-1737

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*

History

07 Nov 2023, 02:19

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c', 'tags': ['Mailing List', 'Patch', 'Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c -
References (BID) http://www.securityfocus.com/bid/67300 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67300 -
References (MLIST) http://www.openwall.com/lists/oss-security/2014/05/09/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/05/09/2 -
References (SECUNIA) http://secunia.com/advisories/59599 - Broken Link () http://secunia.com/advisories/59599 -
References (DEBIAN) http://www.debian.org/security/2014/dsa-2926 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2926 -
References (CONFIRM) https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0800.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0800.html -
References (SECUNIA) http://secunia.com/advisories/59309 - Broken Link () http://secunia.com/advisories/59309 -
References (CONFIRM) http://linux.oracle.com/errata/ELSA-2014-0771.html - Third Party Advisory () http://linux.oracle.com/errata/ELSA-2014-0771.html -
References (SECTRACK) http://www.securitytracker.com/id/1030474 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1030474 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html -
References (CONFIRM) http://linux.oracle.com/errata/ELSA-2014-3043.html - Third Party Advisory () http://linux.oracle.com/errata/ELSA-2014-3043.html -
References (SECUNIA) http://secunia.com/advisories/59406 - Broken Link () http://secunia.com/advisories/59406 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0801.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0801.html -
References (DEBIAN) http://www.debian.org/security/2014/dsa-2928 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2928 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html -
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1094299 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1094299 -
References (SECUNIA) http://secunia.com/advisories/59262 - Broken Link () http://secunia.com/advisories/59262 -

Information

Published : 2014-05-11 21:55

Updated : 2024-02-28 12:20


NVD link : CVE-2014-1737

Mitre link : CVE-2014-1737

CVE.ORG link : CVE-2014-1737


JSON object : View

Products Affected

linux

  • linux_kernel

suse

  • linux_enterprise_real_time_extension
  • linux_enterprise_server
  • linux_enterprise_desktop
  • linux_enterprise_high_availability_extension

debian

  • debian_linux

oracle

  • linux

redhat

  • enterprise_linux_eus
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions