First published: Thu Nov 13 2014(Updated: )
It was found that a read of n*PAGE_SIZE+1 from /dev/zero will cause the kernel to panic due to an unhandled exception since it's not handling the single byte case with a fixup (anything larger than a single byte will properly fault.) A local, unprivileged user could use this flaw to crash the system. Upstream patch proposal: <a href="https://lkml.org/lkml/2014/11/12/584">https://lkml.org/lkml/2014/11/12/584</a> Acknowledgements: This issue was discovered by Miloš Prchlík of Red Hat.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.17.3 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-7843 is considered high due to its potential to cause a kernel panic.
To fix CVE-2014-7843, update the Linux kernel to one of the patched versions such as 5.10.223-1 or later.
CVE-2014-7843 affects Linux kernel versions up to and including 3.17.3.
Yes, CVE-2014-7843 can be exploited by local, unprivileged users to crash the system.
CVE-2014-7843 impacts the kernel's handling of reads from /dev/zero.