It was found that the parse_rock_ridge_inode_internal() function of the Linux kernel's ISOFS implementation did not correctly check relocated directories when processing Rock Ridge child link (CL) tags. An attacker with physical access to the system could use a specially crafted ISO image to crash the system or, potentially, escalate their privileges on the system.
Find out more about CVE-2014-5472 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 5 may address this issue.
Base Score | 6.2 |
---|---|
Base Metrics | AV:L/AC:H/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 7 (kernel) | RHSA-2015:0102 | 2015-01-28 |
Red Hat Enterprise Linux Advanced Update Support 6.2 (kernel) | RHSA-2015:0695 | 2015-03-17 |
Red Hat Enterprise Linux Advanced Update Support 6.4 (kernel) | RHSA-2015:0803 | 2015-04-14 |
Red Hat Enterprise Linux 6 (kernel) | RHSA-2014:1997 | 2014-12-16 |
Red Hat Enterprise Linux Extended Update Support 6.5 (kernel) | RHSA-2015:0782 | 2015-04-07 |
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) | RHSA-2014:1318 | 2014-09-29 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 5 | kernel | Fix deferred |