CVE-2014-8159

Published: 31 December 2014

The InfiniBand (IB) implementation in the Linux kernel package before 2.6.32-504.12.2 on Red Hat Enterprise Linux (RHEL) 6 does not properly restrict use of User Verbs for registration of memory regions, which allows local users to access arbitrary physical memory locations, and consequently cause a denial of service (system crash) or gain privileges, by leveraging permissions on a uverbs device under /dev/infiniband/.

From the Ubuntu security team

It was discovered that the Linux kernel's Infiniband subsystem did not properly sanitize its input parameters while registering memory regions from userspace. A local user could exploit this flaw to cause a denial of service (system crash) or to potentially gain administrative privileges.

Priority

High

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 8494057ab5e40df590ef6ef7d66324d3ae33356b
linux-2.6
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-flo
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-mako
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-manta
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (4.0~rc7)

Notes

AuthorNote
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.10 and earlier preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support
jj
was recorded as CVE-2015-8159 in git commits

References

Bugs