A symlink size validation was missing in Linux kernels built with UDF file system (CONFIG_UDF_FS) support, allowing the corruption of kernel memory. An attacker able to mount a corrupted/malicious UDF file system image could cause the kernel to crash.
Find out more about CVE-2014-9729 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of the Linux kernel as shipped with
Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 5.4 |
---|---|
Base Metrics | AV:L/AC:M/Au:N/C:N/I:P/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Will not fix |
Red Hat Enterprise Linux 7 | kernel-rt | Will not fix |
Red Hat Enterprise Linux 7 | kernel | Will not fix |
Red Hat Enterprise Linux 6 | kernel | Will not fix |
Red Hat Enterprise Linux 5 | kernel | Will not fix |
The UDF filesystem is enabled via loading the UDF kernel module. The kernel module can be prevented from loading via blacklisting see https://access.redhat.com/solutions/41278 for more information.