First published: Mon Jan 12 2015(Updated: )
It was found that the Linux kernel's Infiniband subsystem did not properly sanitize input parameters while registering memory regions from the userspace via the (u)verbs API. As a result, an unrestricted physical memory access could be achieved. A local user with access to /dev/infiniband/uverbsX could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-404.el5 | 0:2.6.18-404.el5 |
redhat/kernel | <0:2.6.18-238.55.1.el5 | 0:2.6.18-238.55.1.el5 |
redhat/kernel | <0:2.6.18-348.30.1.el5 | 0:2.6.18-348.30.1.el5 |
redhat/kernel | <0:2.6.32-504.12.2.el6 | 0:2.6.32-504.12.2.el6 |
redhat/kernel | <0:2.6.32-220.60.2.el6 | 0:2.6.32-220.60.2.el6 |
redhat/kernel | <0:2.6.32-358.59.1.el6 | 0:2.6.32-358.59.1.el6 |
redhat/kernel | <0:2.6.32-431.53.2.el6 | 0:2.6.32-431.53.2.el6 |
redhat/kernel-rt | <0:3.10.0-229.1.2.rt56.141.2.el7_1 | 0:3.10.0-229.1.2.rt56.141.2.el7_1 |
redhat/kernel | <0:3.10.0-229.1.2.ael7b | 0:3.10.0-229.1.2.ael7b |
redhat/kernel-rt | <1:3.10.0-229.rt56.147.el6 | 1:3.10.0-229.rt56.147.el6 |
Linux kernel | <=2.6.32 | |
Red Hat Enterprise Linux | =6.0 | |
Linux kernel | >=2.6.12<3.2.69 | |
Linux kernel | >=3.3<3.4.108 | |
Linux kernel | >=3.5<3.10.75 | |
Linux kernel | >=3.11<3.12.41 | |
Linux kernel | >=3.13<3.14.39 | |
Linux kernel | >=3.15<3.16.35 | |
Linux kernel | >=3.17<3.18.13 | |
Linux kernel | >=3.19<3.19.5 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Debian | =7.0 | |
Debian | =8.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2014-8159 has a severity rating that indicates it may allow local users to gain unrestricted access to physical memory.
To fix CVE-2014-8159, update the Linux kernel to the recommended versions provided by your operating system vendor.
CVE-2014-8159 affects various Linux distributions including Red Hat Enterprise Linux and specific kernel versions.
The impact of CVE-2014-8159 on system security includes the potential for local users to exploit the vulnerability to access sensitive information.
Local users with access to the affected systems and kernel versions are at risk from CVE-2014-8159.