Multiple vulnerabilities in Linux Kernel



| Updated: 2018-05-23
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2014-9922
CVE-2014-8134
CWE-ID CWE-264
CWE-200
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Subscribe
Linux kernel
Operating systems & Components / Operating system

linux_kernel (Debian package)
Operating systems & Components / Operating system package or component

Vendor Linux Foundation
Debian

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Privilege escalation

EUVDB-ID: #VU8117

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-9922

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper privileges and access controls. A local attacker can provide a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c and gain root privileges on the system.

Mitigation

Update to version 4.0.

Vulnerable software versions

Linux kernel: 2.6.13.1 - 3.16.43-2+deb8u2

linux_kernel (Debian package): 3.2.78-1 - 3.16.36-1+deb8u1

CPE2.3 External links

http://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=69c433ed2ecd2d3264efd7...


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Information disclosure

EUVDB-ID: #VU3909

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2014-8134

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows an adjacent attacker to obtain potentially sensitive information on the target system.

The weakness exists in the paravirt_ops_setup function in arch/x86/kernel/kvm.c due to use of an improper paravirt_enabled setting for KVM guest kernels. An adjacent attacker can submit a specially crafted application that reads a 16-bit value, bypass the ASLR protection mechanism and gain access to potentially sensitive information.

Mitigation

Update to version 3.19.

Vulnerable software versions

Linux kernel: 3.18

CPE2.3 External links

http://www.spinics.net/lists/kvm/msg111458.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###