CVE-2014-5472

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
http://marc.info/?l=bugtraq&m=142722450701342&w=2
http://marc.info/?l=bugtraq&m=142722544401658&w=2
http://rhn.redhat.com/errata/RHSA-2014-1318.html
http://rhn.redhat.com/errata/RHSA-2015-0102.html
http://rhn.redhat.com/errata/RHSA-2015-0695.html
http://rhn.redhat.com/errata/RHSA-2015-0782.html
http://rhn.redhat.com/errata/RHSA-2015-0803.html
http://www.openwall.com/lists/oss-security/2014/08/27/1
http://www.securityfocus.com/bid/69428
http://www.ubuntu.com/usn/USN-2354-1
http://www.ubuntu.com/usn/USN-2355-1
http://www.ubuntu.com/usn/USN-2356-1
http://www.ubuntu.com/usn/USN-2357-1
http://www.ubuntu.com/usn/USN-2358-1
http://www.ubuntu.com/usn/USN-2359-1
https://bugzilla.redhat.com/show_bug.cgi?id=1134099
https://code.google.com/p/google-security-research/issues/detail?id=88
https://exchange.xforce.ibmcloud.com/vulnerabilities/95556
https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 Exploit Patch
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html
http://marc.info/?l=bugtraq&m=142722450701342&w=2
http://marc.info/?l=bugtraq&m=142722544401658&w=2
http://rhn.redhat.com/errata/RHSA-2014-1318.html
http://rhn.redhat.com/errata/RHSA-2015-0102.html
http://rhn.redhat.com/errata/RHSA-2015-0695.html
http://rhn.redhat.com/errata/RHSA-2015-0782.html
http://rhn.redhat.com/errata/RHSA-2015-0803.html
http://www.openwall.com/lists/oss-security/2014/08/27/1
http://www.securityfocus.com/bid/69428
http://www.ubuntu.com/usn/USN-2354-1
http://www.ubuntu.com/usn/USN-2355-1
http://www.ubuntu.com/usn/USN-2356-1
http://www.ubuntu.com/usn/USN-2357-1
http://www.ubuntu.com/usn/USN-2358-1
http://www.ubuntu.com/usn/USN-2359-1
https://bugzilla.redhat.com/show_bug.cgi?id=1134099
https://code.google.com/p/google-security-research/issues/detail?id=88
https://exchange.xforce.ibmcloud.com/vulnerabilities/95556
https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 Exploit Patch
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:12

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 -
References () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html -
References () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html - () http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html - () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html - () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html - () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html -
References () http://marc.info/?l=bugtraq&m=142722450701342&w=2 - () http://marc.info/?l=bugtraq&m=142722450701342&w=2 -
References () http://marc.info/?l=bugtraq&m=142722544401658&w=2 - () http://marc.info/?l=bugtraq&m=142722544401658&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2014-1318.html - () http://rhn.redhat.com/errata/RHSA-2014-1318.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0102.html - () http://rhn.redhat.com/errata/RHSA-2015-0102.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0695.html - () http://rhn.redhat.com/errata/RHSA-2015-0695.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0782.html - () http://rhn.redhat.com/errata/RHSA-2015-0782.html -
References () http://rhn.redhat.com/errata/RHSA-2015-0803.html - () http://rhn.redhat.com/errata/RHSA-2015-0803.html -
References () http://www.openwall.com/lists/oss-security/2014/08/27/1 - () http://www.openwall.com/lists/oss-security/2014/08/27/1 -
References () http://www.securityfocus.com/bid/69428 - () http://www.securityfocus.com/bid/69428 -
References () http://www.ubuntu.com/usn/USN-2354-1 - () http://www.ubuntu.com/usn/USN-2354-1 -
References () http://www.ubuntu.com/usn/USN-2355-1 - () http://www.ubuntu.com/usn/USN-2355-1 -
References () http://www.ubuntu.com/usn/USN-2356-1 - () http://www.ubuntu.com/usn/USN-2356-1 -
References () http://www.ubuntu.com/usn/USN-2357-1 - () http://www.ubuntu.com/usn/USN-2357-1 -
References () http://www.ubuntu.com/usn/USN-2358-1 - () http://www.ubuntu.com/usn/USN-2358-1 -
References () http://www.ubuntu.com/usn/USN-2359-1 - () http://www.ubuntu.com/usn/USN-2359-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1134099 - () https://bugzilla.redhat.com/show_bug.cgi?id=1134099 -
References () https://code.google.com/p/google-security-research/issues/detail?id=88 - () https://code.google.com/p/google-security-research/issues/detail?id=88 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/95556 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/95556 -
References () https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 - Exploit, Patch () https://github.com/torvalds/linux/commit/410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 - Exploit, Patch

07 Nov 2023, 02:20

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4', 'tags': ['Exploit', 'Patch'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=410dd3cf4c9b36f27ed4542ee18b1af5e68645a4 -

Information

Published : 2014-09-01 01:55

Updated : 2024-11-21 02:12


NVD link : CVE-2014-5472

Mitre link : CVE-2014-5472

CVE.ORG link : CVE-2014-5472


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-20

Improper Input Validation