A stack-based buffer overflow flaw was found in the TechnoTrend/Hauppauge DEC USB device driver. A local user with write access to the corresponding device could use this flaw to crash the kernel or, potentially, elevate their privileges on the system.
Find out more about CVE-2014-8884 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.
Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.
Base Score | 6 |
---|---|
Base Metrics | AV:L/AC:H/Au:S/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | High |
Authentication | Single |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (kernel) | RHSA-2015:0864 | 2015-04-21 |
Red Hat Enterprise Linux 7 (kernel) | RHSA-2015:0290 | 2015-03-05 |
Red Hat Enterprise Linux Extended Update Support 6.5 (kernel) | RHSA-2015:0782 | 2015-04-07 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise MRG 2 | realtime-kernel | Not affected |
Red Hat Enterprise Linux 5 | kernel | Not affected |