CVE-2014-1737

The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*

Configuration 5 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*

History

07 Nov 2023, 02:19

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c', 'tags': ['Mailing List', 'Patch', 'Vendor Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ef87dbe7614341c2e7bfe8d32fcb7028cc97442c -
References (DEBIAN) http://www.debian.org/security/2014/dsa-2926 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2926 -
References (BID) http://www.securityfocus.com/bid/67300 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67300 -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html -
References (SECUNIA) http://secunia.com/advisories/59406 - Broken Link () http://secunia.com/advisories/59406 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0801.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0801.html -
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html -
References (SECUNIA) http://secunia.com/advisories/59599 - Broken Link () http://secunia.com/advisories/59599 -
References (CONFIRM) http://linux.oracle.com/errata/ELSA-2014-3043.html - Third Party Advisory () http://linux.oracle.com/errata/ELSA-2014-3043.html -
References (CONFIRM) https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/ef87dbe7614341c2e7bfe8d32fcb7028cc97442c -
References (SECUNIA) http://secunia.com/advisories/59309 - Broken Link () http://secunia.com/advisories/59309 -
References (DEBIAN) http://www.debian.org/security/2014/dsa-2928 - Third Party Advisory () http://www.debian.org/security/2014/dsa-2928 -
References (SECTRACK) http://www.securitytracker.com/id/1030474 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1030474 -
References (CONFIRM) http://linux.oracle.com/errata/ELSA-2014-0771.html - Third Party Advisory () http://linux.oracle.com/errata/ELSA-2014-0771.html -
References (SECUNIA) http://secunia.com/advisories/59262 - Broken Link () http://secunia.com/advisories/59262 -
References (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1094299 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1094299 -
References (REDHAT) http://rhn.redhat.com/errata/RHSA-2014-0800.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2014-0800.html -
References (MLIST) http://www.openwall.com/lists/oss-security/2014/05/09/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/05/09/2 -

Information

Published : 2014-05-11 21:55

Updated : 2023-12-10 11:31


NVD link : CVE-2014-1737

Mitre link : CVE-2014-1737

CVE.ORG link : CVE-2014-1737


JSON object : View

Products Affected

suse

  • linux_enterprise_server
  • linux_enterprise_high_availability_extension
  • linux_enterprise_desktop
  • linux_enterprise_real_time_extension

linux

  • linux_kernel

oracle

  • linux

redhat

  • enterprise_linux_eus

debian

  • debian_linux
CWE
CWE-754

Improper Check for Unusual or Exceptional Conditions