CVE-2014-4027
Summary
| CVE | CVE-2014-4027 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-06-23 11:21:00 UTC |
| Updated | 2023-11-07 02:20:00 UTC |
| Description | The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveraging access to a SCSI initiator. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Access Policy Manager | All | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Advanced Firewall Manager | All | All | All | All |
| Application | F5 | Big-ip Analytics | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Analytics | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Analytics | All | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Acceleration Manager | All | All | All | All |
| Application | F5 | Big-ip Application Security Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Security Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Application Security Manager | All | All | All | All |
| Application | F5 | Big-ip Domain Name System | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Domain Name System | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Edge Gateway | All | All | All | All |
| Application | F5 | Big-ip Global Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Link Controller | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Link Controller | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Link Controller | All | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Local Traffic Manager | All | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | 12.0.0 | All | All | All |
| Application | F5 | Big-ip Policy Enforcement Manager | All | All | All | All |
| Application | F5 | Big-ip Protocol Security Module | All | All | All | All |
| Application | F5 | Big-ip Wan Optimization Manager | All | All | All | All |
| Application | F5 | Big-ip Webaccelerator | All | All | All | All |
| Application | F5 | Big-iq Application Delivery Controller | 4.5.0 | All | All | All |
| Application | F5 | Big-iq Application Delivery Controller | 4.5.0 | All | All | All |
| Application | F5 | Big-iq Cloud | All | All | All | All |
| Application | F5 | Big-iq Device | All | All | All | All |
| Application | F5 | Big-iq Security | All | All | All | All |
| Application | F5 | Enterprise Manager | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux | 6.0 | All | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Desktop | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise High Availability Extension | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise High Availability Extension | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Real Time Extension | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Real Time Extension | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp3 | All | All |
| Operating System | Suse | Linux Enterprise Server | 11 | sp3 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] SUSE-SU-2014:1319-1: important: Security update for | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| git.kernel.org | git.kernel.org | ||
| Security Advisory SA59777 - Ubuntu update for kernel - Secunia | SECUNIA | secunia.com | Broken Link |
| target/rd: Refactor rd_build_device_space + rd_release_device_space · torvalds/linux@4442dc8 · GitHub | CONFIRM | github.com | Patch, Third Party Advisory |
| Security Advisory SA61310 - F5 Multiple Products Linux Kernel Two Vulnerabilities - Secunia | SECUNIA | secunia.com | Broken Link |
| Security Advisory SA59134 - Linux Kernel SCSI Initiator I/O Operations Information Disclosure Vulnerability - Secunia | SECUNIA | secunia.com | Broken Link |
| [PATCH] target: Explicitly clear ramdisk_mcp backend pages | MLIST | permalink.gmane.org | Broken Link |
| SOL15685 - Linux kernel vulnerability CVE-2014-3940 | CONFIRM | support.f5.com | Third Party Advisory |
| USN-2335-1: Linux kernel (OMAP4) vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| [security-announce] SUSE-SU-2014:1316-1: important: Security update for | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| Security Advisory SA60564 - Ubuntu update for kernel - Secunia | SECUNIA | secunia.com | Broken Link |
| oss-security - Re: CVE request: Linux kernel / target information leak | MLIST | www.openwall.com | Mailing List, Patch, Third Party Advisory |
| Bug 1108744 – CVE-2014-4027 Kernel: target/rd: imformation leakage | CONFIRM | bugzilla.redhat.com | Issue Tracking, Patch, Third Party Advisory |
| USN-2334-1: Linux kernel vulnerabilities | Ubuntu | UBUNTU | www.ubuntu.com | Third Party Advisory |
| kernel/git/torvalds/linux.git - Linux kernel source tree | CONFIRM | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.