CVE-2014-8159

Current Description

The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.

Basic Data

PublishedMarch 16, 2015
Last ModifiedApril 22, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:M/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score6.9
SeverityMEDIUM
Exploitability Score3.4
Impact Score10.0
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSLinuxLinux Kernel********2.6.32
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSRedhatEnterprise Linux6.0*******

Vulnerable Software List

VendorProductVersions
Redhat Enterprise Linux 6.0
Linux Linux Kernel *

References

NameSourceURLTags
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705CONFIRM
FEDORA-2015-4066http://lists.fedoraproject.org/pipermail/package-announce/2015-March/152747.htmlFEDORA
SUSE-SU-2015:1478http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.htmlSUSE
SUSE-SU-2015:1487http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00007.htmlSUSE
SUSE-SU-2015:1488http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00008.htmlSUSE
SUSE-SU-2015:1489http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00009.htmlSUSE
SUSE-SU-2015:1491http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00011.htmlSUSE
RHSA-2015:0674http://rhn.redhat.com/errata/RHSA-2015-0674.htmlREDHAT
RHSA-2015:0695http://rhn.redhat.com/errata/RHSA-2015-0695.htmlREDHAT
RHSA-2015:0726http://rhn.redhat.com/errata/RHSA-2015-0726.htmlREDHAT
RHSA-2015:0751http://rhn.redhat.com/errata/RHSA-2015-0751.htmlREDHAT
RHSA-2015:0782http://rhn.redhat.com/errata/RHSA-2015-0782.htmlREDHAT
RHSA-2015:0783http://rhn.redhat.com/errata/RHSA-2015-0783.htmlREDHAT
RHSA-2015:0803http://rhn.redhat.com/errata/RHSA-2015-0803.htmlREDHAT
RHSA-2015:0870http://rhn.redhat.com/errata/RHSA-2015-0870.htmlREDHAT
RHSA-2015:0919http://rhn.redhat.com/errata/RHSA-2015-0919.htmlREDHAT
DSA-3237http://www.debian.org/security/2015/dsa-3237DEBIAN
73060http://www.securityfocus.com/bid/73060BID
1032224http://www.securitytracker.com/id/1032224SECTRACK
USN-2525-1http://www.ubuntu.com/usn/USN-2525-1UBUNTU
USN-2526-1http://www.ubuntu.com/usn/USN-2526-1UBUNTU
USN-2527-1http://www.ubuntu.com/usn/USN-2527-1UBUNTU
USN-2528-1http://www.ubuntu.com/usn/USN-2528-1UBUNTU
USN-2529-1http://www.ubuntu.com/usn/USN-2529-1UBUNTU
USN-2530-1http://www.ubuntu.com/usn/USN-2530-1UBUNTU
USN-2561-1http://www.ubuntu.com/usn/USN-2561-1UBUNTU
https://bugzilla.redhat.com/show_bug.cgi?id=1181166https://bugzilla.redhat.com/show_bug.cgi?id=1181166CONFIRM