First published: Fri Nov 07 2014(Updated: )
An out-of-bounds memory access flaw was found in the Linux kernel's perf and ftrace subsystems. On a system with syscall perf profiling on (<a href="https://access.redhat.com/security/cve/CVE-2014-7825">CVE-2014-7825</a>) an unprivileged local user could use this flaw to crash the system. On a system with ftrace syscall tracing on (<a href="https://access.redhat.com/security/cve/CVE-2014-7826">CVE-2014-7826</a>) an unprivileged local user could use this flaw to crash the system or escalate their privileges on the system. References: <a href="http://www.openwall.com/lists/oss-security/2014/11/06/11">http://www.openwall.com/lists/oss-security/2014/11/06/11</a> Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=086ba77a6db00ed858ff07451bedee197df868c9">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=086ba77a6db00ed858ff07451bedee197df868c9</a> Acknowledgements: Red Hat would like to thank Robert Święcki for reporting these issues.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.32-504.16.2.el6 | 0:2.6.32-504.16.2.el6 |
redhat/kernel | <0:3.10.0-229.el7 | 0:3.10.0-229.el7 |
redhat/kernel-rt | <0:3.10.58-rt62.58.el6 | 0:3.10.58-rt62.58.el6 |
Linux Linux kernel | >=2.6.32<3.2.65 | |
Linux Linux kernel | >=3.3<3.4.106 | |
Linux Linux kernel | >=3.5<3.10.60 | |
Linux Linux kernel | >=3.11<3.12.33 | |
Linux Linux kernel | >=3.13<3.14.24 | |
Linux Linux kernel | >=3.15<3.16.35 | |
Linux Linux kernel | >=3.17<3.17.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)