CVE-2014-3144

CVSS v2.0 4.9 (Medium)
49% Progress
EPSS 0.12 % (47th)
0.12% Progress
Affected Products 4
Advisories 58

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

Weaknesses
CWE-190
Integer Overflow or Wraparound
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2014-05-11 21:55:06
(10 years ago)
Updated Date
2023-11-07 02:19:42
(10 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel 3.14.3 and prior versions cpe:2.3:o:linux:linux_kernel <= 3.14.3

Configuration #2

    CPE23 From Up To
  Debian Linux 7.0 cpe:2.3:o:debian:debian_linux:7.0

Configuration #3

    CPE23 From Up To
  Canonical Ubuntu Linux 10.04 cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-
  Canonical Ubuntu Linux 12.04 cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm
  Canonical Ubuntu Linux 13.10 cpe:2.3:o:canonical:ubuntu_linux:13.10

Configuration #4

    CPE23 From Up To
  Oracle Linux 6 cpe:2.3:o:oracle:linux:6:-
  Oracle Linux 7 cpe:2.3:o:oracle:linux:7:-
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...