SB2014111004 - Buffer overflow in Linux kernel
Published: November 10, 2014 Updated: August 10, 2020
Security Bulletin ID
SB2014111004
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2014-7825)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism via a crafted application.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=086ba77a6db00ed858ff07451bedee197df868c9
- http://rhn.redhat.com/errata/RHSA-2014-1943.html
- http://rhn.redhat.com/errata/RHSA-2015-0290.html
- http://rhn.redhat.com/errata/RHSA-2015-0864.html
- http://www.openwall.com/lists/oss-security/2014/11/06/11
- http://www.securityfocus.com/bid/70972
- https://bugzilla.redhat.com/show_bug.cgi?id=1161565
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98557
- https://github.com/torvalds/linux/commit/086ba77a6db00ed858ff07451bedee197df868c9