Описание
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
A use-after-free flaw was found in the way the ping_init_sock() function of the Linux kernel handled the group_info reference counter. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Отчет
This issue does not affect Linux kernel packages as shipped with Red Hat Enterprise Linux 5.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2014:0981 | 29.07.2014 |
Red Hat Enterprise Linux 6.4 Extended Update Support | kernel | Fixed | RHSA-2014:1101 | 27.08.2014 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2014:0786 | 24.06.2014 |
Red Hat Enterprise MRG 2 | kernel-rt | Fixed | RHSA-2014:0557 | 27.05.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.2 Medium
CVSS2
Связанные уязвимости
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in ...
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
ELSA-2014-3019: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS
6.2 Medium
CVSS2