CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
10.1%
The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | * | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 5.6 | cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 6.3 | cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:* |
debian | debian_linux | 6.0 | cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* |
debian | debian_linux | 7.0 | cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
oracle | linux | 5 | cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:* |
oracle | linux | 6 | cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:* |
suse | linux_enterprise_desktop | 11 | cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* |
suse | linux_enterprise_high_availability_extension | 11 | cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:* |
suse | linux_enterprise_real_time_extension | 11 | cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:* |
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2145e15e0557a01b9195d1c7199a1b92cb9be81f
linux.oracle.com/errata/ELSA-2014-0771.html
linux.oracle.com/errata/ELSA-2014-3043.html
lists.opensuse.org/opensuse-security-announce/2014-05/msg00007.html
lists.opensuse.org/opensuse-security-announce/2014-05/msg00012.html
rhn.redhat.com/errata/RHSA-2014-0800.html
rhn.redhat.com/errata/RHSA-2014-0801.html
secunia.com/advisories/59262
secunia.com/advisories/59309
secunia.com/advisories/59406
secunia.com/advisories/59599
www.debian.org/security/2014/dsa-2926
www.debian.org/security/2014/dsa-2928
www.openwall.com/lists/oss-security/2014/05/09/2
www.securityfocus.com/bid/67302
www.securitytracker.com/id/1030474
bugzilla.redhat.com/show_bug.cgi?id=1094299
github.com/torvalds/linux/commit/2145e15e0557a01b9195d1c7199a1b92cb9be81f