CVE-2014-7826

Impact:
Moderate
Public Date:
2014-11-07
Bugzilla:
1161565: CVE-2014-7825 CVE-2014-7826 kernel: insufficient syscall number validation in perf and ftrace subsystems
An out-of-bounds memory access flaw, CVE-2014-7825, was found in the syscall tracing functionality of the Linux kernel's perf subsystem. A local, unprivileged user could use this flaw to crash the system. Additionally, an out-of-bounds memory access flaw, CVE-2014-7826, was found in the syscall tracing functionality of the Linux kernel's ftrace subsystem. On a system with ftrace syscall tracing enabled, a local, unprivileged user could use this flaw to crash the system, or escalate their privileges.

Find out more about CVE-2014-7826 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue does not affect the Linux kernel packages as shipped with Red Hat
Enterprise Linux 5.

This issue does affect the Linux kernel packages as shipped with Red Hat
Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for
the respective releases may address this issue.

Note that the impact on Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise
MRG 2 is limited to local denial of service. Privilege escalation is not
possible.

CVSS v2 metrics

Base Score 4
Base Metrics AV:L/AC:H/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (kernel) RHSA-2015:0864 2015-04-21
Red Hat Enterprise Linux 7 (kernel) RHSA-2015:0290 2015-03-05
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2014:1943 2014-12-02

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 kernel Not affected

Acknowledgements

Red Hat would like to thank Robert Święcki for reporting these issues.
Last Modified