Permissions, Privileges, and Access Controls in Linux kernel - CVE-2014-4027

 

Permissions, Privileges, and Access Controls in Linux kernel - CVE-2014-4027

Published: June 23, 2014 / Updated: August 10, 2020


Vulnerability identifier: #VU41531
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2014-4027
CWE-ID: CWE-264
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a remote #AU# to gain access to sensitive information.

The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.


How to mitigate CVE-2014-4027

Install update from vendor's website.

Sources