Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2014-1738 |
CWE-ID | CWE-264 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Linux kernel Operating systems & Components / Operating system |
Vendor | Linux Foundation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU41702
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2014-1738
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
MitigationInstall update from vendor's website.
Vulnerable software versionsLinux kernel: 3.0 - 3.14.2
CPE2.3https://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=2145e15e0557a01b9195d1c7199a1b92cb9be81f
https://linux.oracle.com/errata/ELSA-2014-0771.html
https://linux.oracle.com/errata/ELSA-2014-3043.html
https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
https://lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
https://rhn.redhat.com/errata/RHSA-2014-0800.html
https://rhn.redhat.com/errata/RHSA-2014-0801.html
https://secunia.com/advisories/59262
https://secunia.com/advisories/59309
https://secunia.com/advisories/59406
https://secunia.com/advisories/59599
https://www.debian.org/security/2014/dsa-2926
https://www.debian.org/security/2014/dsa-2928
https://www.openwall.com/lists/oss-security/2014/05/09/2
https://www.securityfocus.com/bid/67302
https://www.securitytracker.com/id/1030474
https://bugzilla.redhat.com/show_bug.cgi?id=1094299
https://github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.