Vulnerability Description
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-2013-7421.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.18.5 |
| Debian | Debian Linux | 7.0 |
| Canonical | Ubuntu Linux | 12.04 |
| Oracle | Linux | 5 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://rhn.redhat.com/errata/RHSA-2016-0068.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3170Third Party Advisory
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.5Release NotesVendor Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:057Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:058Third Party Advisory
- http://www.openwall.com/lists/oss-security/2015/01/24/4Mailing ListThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.hThird Party Advisory
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.hThird Party Advisory
- http://www.securityfocus.com/bid/72320Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2513-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2514-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2543-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2544-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2545-1Third Party Advisory
FAQ
What is CVE-2014-9644?
CVE-2014-9644 is a vulnerability with a CVSS score of 2.1 (LOW). The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the ...
How severe is CVE-2014-9644?
CVE-2014-9644 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9644?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Debian Debian Linux, Canonical Ubuntu Linux, Oracle Linux.