CVE-2014-1739
Published: 23 June 2014
The media_device_enum_entities function in drivers/media/media-device.c in the Linux kernel before 3.14.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging /dev/media0 read access for a MEDIA_IOC_ENUM_ENTITIES ioctl call.
From the Ubuntu security team
Salva Peiró discovered an information leak in the Linux kernel's media- device driver. A local attacker could exploit this flaw to obtain sensitive information from kernel memory.
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-2.6 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.15~rc6)
|
Notes
Author | Note |
---|---|
jdstrand | android kernels (goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 13.10 preview kernels android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6a623460e5fc960ac3ee9f946d3106233fd28d8
- https://ubuntu.com/security/notices/USN-2259-1
- https://ubuntu.com/security/notices/USN-2261-1
- https://ubuntu.com/security/notices/USN-2263-1
- https://ubuntu.com/security/notices/USN-2264-1
- https://ubuntu.com/security/notices/USN-2285-1
- https://ubuntu.com/security/notices/USN-2286-1
- https://ubuntu.com/security/notices/USN-2288-1
- https://ubuntu.com/security/notices/USN-2290-1
- NVD
- Launchpad
- Debian