The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Big-ip Access Policy Manager Subscribe
Big-ip Advanced Firewall Manager Subscribe
Big-ip Analytics Subscribe
Big-ip Application Acceleration Manager Subscribe
Big-ip Application Security Manager Subscribe
Big-ip Domain Name System Subscribe
Big-ip Edge Gateway Subscribe
Big-ip Global Traffic Manager Subscribe
Big-ip Link Controller Subscribe
Big-ip Local Traffic Manager Subscribe
Big-ip Policy Enforcement Manager Subscribe
Big-ip Protocol Security Module Subscribe
Big-ip Wan Optimization Manager Subscribe
Big-ip Webaccelerator Subscribe
Big-iq Application Delivery Controller Subscribe
Big-iq Cloud Subscribe
Big-iq Device Subscribe
Big-iq Security Subscribe
Enterprise Manager Subscribe
Linux Kernel Subscribe
Enterprise Linux Subscribe
Enterprise Mrg Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise High Availability Extension Subscribe
Linux Enterprise Real Time Extension Subscribe
Linux Enterprise Server Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2014-3959 The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator.
Ubuntu USN Ubuntu USN USN-2285-1 Linux kernel (Quantal HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2334-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2335-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-2336-1 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2337-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T11:04:27.539Z

Reserved: 2014-06-11T00:00:00

Link: CVE-2014-4027

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-06-23T11:21:18.700

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-4027

cve-icon Redhat

Severity : Low

Publid Date: 2014-01-07T00:00:00Z

Links: CVE-2014-4027 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses