[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-9731Date: (C)2015-09-01   (M)2024-04-19


The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.1
Exploit Score: 3.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
BID-75001
SUSE-SU-2015:1224
SUSE-SU-2015:1324
SUSE-SU-2015:1592
SUSE-SU-2015:1611
http://www.openwall.com/lists/oss-security/2015/06/03/4
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.2
https://bugzilla.redhat.com/show_bug.cgi?id=1228220
https://github.com/torvalds/linux/commit/0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
https://source.android.com/security/bulletin/2017-07-01
openSUSE-SU-2015:1382

CPE    1
cpe:/o:linux:linux_kernel
CWE    1
CWE-17
OVAL    9
oval:org.secpod.oval:def:702481
oval:org.secpod.oval:def:52434
oval:org.secpod.oval:def:702431
oval:org.secpod.oval:def:702474
...

© SecPod Technologies