#VU41276 Use-after-free in Linux kernel - CVE-2014-0205
Published: September 28, 2014 / Updated: August 10, 2020
Vulnerability identifier: #VU41276
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2014-0205
CWE-ID: CWE-416
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
Linux kernel
Linux kernel
Software vendor:
Linux Foundation
Linux Foundation
Description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error when processing a crafted application that triggers a zero count. A local users can cause a denial of service (use-after-free and system crash) or possibly gain privileges.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
External links
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=7ada876a8703f23befbb20a7465a702ee39b1704
- http://mirror.linux.org.au/linux/kernel/v2.6/ChangeLog-2.6.37
- http://rhn.redhat.com/errata/RHSA-2014-1365.html
- http://rhn.redhat.com/errata/RHSA-2014-1763.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1094455
- https://github.com/torvalds/linux/commit/7ada876a8703f23befbb20a7465a702ee39b1704