First published: Tue Aug 26 2014(Updated: )
It was found that the parse_rock_ridge_inode_internal() function of the Linux kernel's ISOFS implementation did not correctly check relocated directories when processing Rock Ridge child link (CL) tags. An attacker with physical access to the system could use a specially crafted ISO image to crash the system or, potentially, escalate their privileges on the system.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-504.3.3.el6 | 0:2.6.32-504.3.3.el6 |
redhat/kernel | <0:2.6.32-220.60.2.el6 | 0:2.6.32-220.60.2.el6 |
redhat/kernel | <0:2.6.32-358.59.1.el6 | 0:2.6.32-358.59.1.el6 |
redhat/kernel | <0:2.6.32-431.53.2.el6 | 0:2.6.32-431.53.2.el6 |
redhat/kernel | <0:3.10.0-123.20.1.el7 | 0:3.10.0-123.20.1.el7 |
redhat/kernel-rt | <0:3.10.33-rt32.51.el6 | 0:3.10.33-rt32.51.el6 |
Linux Kernel | <=3.16.1 | |
Linux Kernel | =3.16.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2014-5471 is rated as a moderate severity vulnerability that can lead to system crashes through specially crafted ISO images.
To mitigate CVE-2014-5471, update your Linux kernel to one of the affected versions that contain the security patch.
CVE-2014-5471 affects users of the Linux kernel versions prior to the patched versions listed in the vulnerability report.
CVE-2014-5471 is a vulnerability in the ISOFS implementation of the Linux kernel related to improper handling of Rock Ridge child link tags.
CVE-2014-5471 requires physical access to the vulnerable system for exploitation, making it less likely to be exploited remotely.