Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-2851

Опубликовано: 11 апр. 2014
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

A use-after-free flaw was found in the way the ping_init_sock() function of the Linux kernel handled the group_info reference counter. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Отчет

This issue does not affect Linux kernel packages as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:098129.07.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:110127.08.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:078624.06.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:055727.05.2014

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1086730kernel: net: ping: refcount issue in ping_init_sock() function

EPSS

Процентиль: 46%
0.00227
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

nvd
больше 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

debian
больше 11 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in ...

github
около 3 лет назад

Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.

oracle-oval
больше 11 лет назад

ELSA-2014-3019: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 46%
0.00227
Низкий

6.2 Medium

CVSS2