Vulnerability Description
The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | <= 3.14.3 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 10.04 |
| Oracle | Linux | 6 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://linux.oracle.com/errata/ELSA-2014-3052.htmlThird Party Advisory
- http://secunia.com/advisories/58990Broken Link
- http://secunia.com/advisories/59311Not Applicable
- http://secunia.com/advisories/59597Broken Link
- http://secunia.com/advisories/60613Not Applicable
- http://www.debian.org/security/2014/dsa-2949Third Party Advisory
- http://www.openwall.com/lists/oss-security/2014/05/09/6Mailing ListPatchThird Party Advisory
- http://www.securityfocus.com/bid/67309Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2251-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2252-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2259-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2261-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2262-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2263-1Third Party Advisory
FAQ
What is CVE-2014-3144?
CVE-2014-3144 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain le...
How severe is CVE-2014-3144?
CVE-2014-3144 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3144?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux, Oracle Linux.