CVE-2014-3535

CVSS v2.0 7.8 (High)
78% Progress
EPSS 2.22 % (90th)
2.22% Progress
Affected Products 1
Advisories 4

include/linux/netdevice.h in the Linux kernel before 2.6.36 incorrectly uses macros for netdev_printk and its related logging implementation, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) by sending invalid packets to a VxLAN interface.

Weaknesses
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2014-09-28 19:55:05
(10 years ago)
Updated Date
2023-02-13 00:40:35
(19 months ago)

Affected Products

Loading...
Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel 2.6.35.13 and prior versions cpe:2.3:o:linux:linux_kernel <= 2.6.35.13
  Linux Kernel 2.6.35 cpe:2.3:o:linux:linux_kernel:2.6.35
  Linux Kernel 2.6.35 Rc1 cpe:2.3:o:linux:linux_kernel:2.6.35:rc1
  Linux Kernel 2.6.35 Rc2 cpe:2.3:o:linux:linux_kernel:2.6.35:rc2
  Linux Kernel 2.6.35 Rc3 cpe:2.3:o:linux:linux_kernel:2.6.35:rc3
  Linux Kernel 2.6.35 Rc4 cpe:2.3:o:linux:linux_kernel:2.6.35:rc4
  Linux Kernel 2.6.35 Rc5 cpe:2.3:o:linux:linux_kernel:2.6.35:rc5
  Linux Kernel 2.6.35 Rc6 cpe:2.3:o:linux:linux_kernel:2.6.35:rc6
  Linux Kernel 2.6.35.1 cpe:2.3:o:linux:linux_kernel:2.6.35.1
  Linux Kernel 2.6.35.2 cpe:2.3:o:linux:linux_kernel:2.6.35.2
  Linux Kernel 2.6.35.3 cpe:2.3:o:linux:linux_kernel:2.6.35.3
  Linux Kernel 2.6.35.4 cpe:2.3:o:linux:linux_kernel:2.6.35.4
  Linux Kernel 2.6.35.5 cpe:2.3:o:linux:linux_kernel:2.6.35.5
  Linux Kernel 2.6.35.6 cpe:2.3:o:linux:linux_kernel:2.6.35.6
  Linux Kernel 2.6.35.7 cpe:2.3:o:linux:linux_kernel:2.6.35.7
  Linux Kernel 2.6.35.8 cpe:2.3:o:linux:linux_kernel:2.6.35.8
  Linux Kernel 2.6.35.9 cpe:2.3:o:linux:linux_kernel:2.6.35.9
  Linux Kernel 2.6.35.10 cpe:2.3:o:linux:linux_kernel:2.6.35.10
  Linux Kernel 2.6.35.11 cpe:2.3:o:linux:linux_kernel:2.6.35.11
  Linux Kernel 2.6.35.12 cpe:2.3:o:linux:linux_kernel:2.6.35.12
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...