2.1
CVSSv2

CVE-2014-9584

Published: 09/01/2015 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel prior to 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux aus 6.6

redhat enterprise linux server eus 7.2

redhat enterprise linux server eus 7.1

redhat enterprise linux desktop 6.0

redhat enterprise linux server 6.0

redhat enterprise linux workstation 6.0

redhat enterprise linux eus 6.6

redhat enterprise linux server tus 7.3

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux server eus 7.3

redhat enterprise linux server eus 7.4

redhat enterprise linux server eus 7.5

redhat enterprise linux server tus 7.6

redhat enterprise linux server eus 7.6

redhat enterprise linux server aus 7.6

redhat enterprise linux server tus 6.6

redhat enterprise linux server eus 7.7

redhat enterprise linux server aus 7.7

redhat enterprise linux server tus 7.7

suse linux enterprise server 11

opensuse evergreen 11.4

suse linux enterprise real time extension 11

suse linux enterprise workstation extension 12

suse linux enterprise server 10

opensuse opensuse 13.1

suse linux enterprise server 12

suse linux enterprise software development kit 12

suse linux enterprise desktop 12

debian debian linux 8.0

debian debian linux 7.0

canonical ubuntu linux 12.04

canonical ubuntu linux 14.10

canonical ubuntu linux 14.04

canonical ubuntu linux 10.04

oracle linux 5

Vendor Advisories

Debian Bug report logs - #774155 linux: CVE-2014-9428: Remote crash of kernel via batman-adv module Package: linux; Maintainer for linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: conchur@webde Date: Mon, 29 Dec 2014 16:48:01 UTC Severity: important Tags: patch, security, upstream Found in versi ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or information leaks CVE-2013-6885 It was discovered that under specific circumstances, a combination of write operations to write-combined memory and locked CPU instructions may cause a core hang on AMD 16h 00h through 0Fh proces ...
USN-2516-1 introduced a regression in the Linux kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
USN-2516-1 introduced a regression in the Linux kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
USN-2515-1 introduced a regression in the Linux kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
An information leak flaw was found in the way the Linux kernel's ISO9660 file system implementation accessed data on an ISO9660 image with RockRidge Extension Reference (ER) records An attacker with physical access to the system could use this flaw to disclose up to 255 bytes of kernel memory ...

References

CWE-20http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2http://www.openwall.com/lists/oss-security/2015/01/09/4https://bugzilla.redhat.com/show_bug.cgi?id=1180119https://github.com/torvalds/linux/commit/4e2024624e678f0ebb916e6192bd23c1f9fdf696http://www.ubuntu.com/usn/USN-2512-1http://www.ubuntu.com/usn/USN-2511-1http://www.ubuntu.com/usn/USN-2518-1http://www.ubuntu.com/usn/USN-2515-1http://www.ubuntu.com/usn/USN-2516-1http://www.ubuntu.com/usn/USN-2517-1http://www.debian.org/security/2015/dsa-3128http://www.ubuntu.com/usn/USN-2514-1http://www.ubuntu.com/usn/USN-2513-1http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:058http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttp://www.securityfocus.com/bid/71883http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1138.htmlhttp://rhn.redhat.com/errata/RHSA-2015-1137.htmlhttp://rhn.redhat.com/errata/RHSA-2015-0864.htmlhttp://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774155https://nvd.nist.govhttps://usn.ubuntu.com/2516-3/https://access.redhat.com/security/cve/cve-2014-9584https://www.debian.org/security/./dsa-3128