CVE-2014-2672
kernel: ath9k: tid->sched race in ath_tx_aggr_sleep()
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the ath_tx_aggr_sleep function in drivers/net/wireless/ath/ath9k/xmit.c in the Linux kernel before 3.13.7 allows remote attackers to cause a denial of service (system crash) via a large amount of network traffic that triggers certain list deletions.
Condición de carrera en la función ath_tx_aggr_sleep en drivers/net/wireless/ath/ath9k/xmit.c en el kernel de Linux anterior a 3.13.7 permite a atacantes remotos causar una denegación de servicio (caída de sistema) a través de una cantidad grande de tráfico de red que provoca ciertas eliminaciones de lista.
It was found that a remote attacker could use a race condition flaw in the ath_tx_aggr_sleep() function to crash the system by creating large network traffic on the system's Atheros 9k wireless network adapter.
The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that Linux kernel's ptrace subsystem did not properly sanitize the address-space-control bits when the program-status word was being set. On IBM S/390 systems, a local, unprivileged user could use this flaw to set address-space-control bits to the kernel space, and thus gain read and write access to kernel memory. It was found that the permission checks performed by the Linux kernel when a netlink message was received were not sufficient. A local, unprivileged user could potentially bypass these restrictions by passing a netlink socket as stdout or stderr to a more privileged process and altering the output of this process.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-03-30 CVE Reserved
- 2014-04-01 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=21f8aaee0c62708654988ce092838aa7df4d25d8 | X_refsource_confirm | |
http://secunia.com/advisories/57468 | Third Party Advisory | |
http://www.securityfocus.com/bid/66492 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.openwall.com/lists/oss-security/2014/03/30/5 | 2023-11-07 | |
https://bugzilla.kernel.org/show_bug.cgi?id=70551 | 2023-11-07 | |
https://github.com/torvalds/linux/commit/21f8aaee0c62708654988ce092838aa7df4d25d8 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.13.7 | 2023-11-07 | |
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.15 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2014-2672 | 2014-08-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1083246 | 2014-08-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.2 < 3.2.56 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.2 < 3.2.56" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.3 < 3.4.92 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.4.92" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.5 < 3.10.42 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.5 < 3.10.42" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 < 3.12.15 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.12.15" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.13 < 3.13.7 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 < 3.13.7" | - |
Affected
|