The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 02:20
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2014-06-23 11:21
Updated : 2024-02-28 12:20
NVD link : CVE-2014-4027
Mitre link : CVE-2014-4027
CVE.ORG link : CVE-2014-4027
JSON object : View
Products Affected
suse
- linux_enterprise_server
- linux_enterprise_desktop
- linux_enterprise_high_availability_extension
- linux_enterprise_real_time_extension
f5
- big-ip_advanced_firewall_manager
- big-ip_local_traffic_manager
- big-ip_protocol_security_module
- big-iq_cloud
- big-ip_application_acceleration_manager
- big-iq_application_delivery_controller
- big-ip_domain_name_system
- big-ip_webaccelerator
- big-ip_link_controller
- big-iq_security
- big-ip_edge_gateway
- big-ip_wan_optimization_manager
- big-ip_global_traffic_manager
- enterprise_manager
- big-iq_device
- big-ip_application_security_manager
- big-ip_analytics
- big-ip_access_policy_manager
- big-ip_policy_enforcement_manager
redhat
- enterprise_linux
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor