Description
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-3959 | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. |
Ubuntu USN |
USN-2285-1 | Linux kernel (Quantal HWE) vulnerabilities |
Ubuntu USN |
USN-2334-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2335-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2336-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2337-1 | Linux kernel vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
F5
Subscribe
Big-ip Access Policy Manager
Subscribe
Big-ip Advanced Firewall Manager
Subscribe
Big-ip Analytics
Subscribe
Big-ip Application Acceleration Manager
Subscribe
Big-ip Application Security Manager
Subscribe
Big-ip Domain Name System
Subscribe
Big-ip Edge Gateway
Subscribe
Big-ip Global Traffic Manager
Subscribe
Big-ip Link Controller
Subscribe
Big-ip Local Traffic Manager
Subscribe
Big-ip Policy Enforcement Manager
Subscribe
Big-ip Protocol Security Module
Subscribe
Big-ip Wan Optimization Manager
Subscribe
Big-ip Webaccelerator
Subscribe
Big-iq Application Delivery Controller
Subscribe
Big-iq Cloud
Subscribe
Big-iq Device
Subscribe
Big-iq Security
Subscribe
Enterprise Manager
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Mrg
Subscribe
Suse
Subscribe
Linux Enterprise Desktop
Subscribe
Linux Enterprise High Availability Extension
Subscribe
Linux Enterprise Real Time Extension
Subscribe
Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T11:04:27.539Z
Reserved: 2014-06-11T00:00:00.000Z
Link: CVE-2014-4027
No data.
Status : Deferred
Published: 2014-06-23T11:21:18.700
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-4027
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN