7.2
CVSSv2

CVE-2014-7822

Published: 16/03/2015 Updated: 13/02/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The implementation of certain splice_write file operations in the Linux kernel prior to 3.16 does not enforce a restriction on the maximum size of a single file, which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor associated with an ext4 filesystem.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix multiple security issues and several bugsare now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having Important securityimpact ...
Synopsis Moderate: kernel security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated kernel packages that fix one security issue and several bugs arenow available for Red Hat Enterprise Linux 5Red Hat Product Security has rated this update as having Moderate securityimpact A Commo ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leaks or privilege escalation CVE-2013-7421 / CVE-2014-9644 It was discovered that the Crypto API allowed unprivileged users to load arbitrary kernel modules A local user can use this flaw to exploit vulnerabilities ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
The Linux kernel through 3174 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups ...
A flaw was found in the way the Linux kernel's splice() system call validated its parameters On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system ...

Exploits

/* ---------------------------------------------------------------------------------------------------- * cve-2014-7822_pocc * * The implementation of certain splice_write file operations in the Linux kernel before 316 does not enforce a restriction on the maximum size of a single file * which allows local users to cause a denial of service ...
The implementation of certain splice_write file operations in the Linux kernel before 316 does not enforce a restriction on the maximum size of a single file which allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted splice system call, as demonstrated by use of a file descriptor as ...