CVE-2014-6417
Ubuntu Security Notice USN-2379-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly consider the possibility of kmalloc failure, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a long unencrypted auth ticket.
net/ceph/auth_x.c en Ceph, utilizado en el kernel de Linux anterior a 3.16.3, no considera debidamente la posibilidad de fallos de kmalloc, lo que permite a atacantes remotos causar una denegación de servicio (caída del sistema) o posiblemente tener otro impacto no especificado a través de un ticket de autor largo no cifrado.
Steven Vittitoe reported multiple stack buffer overflows in Linux kernel's magicmouse HID driver. A physically proximate attacker could exploit this flaw to cause a denial of service (system crash) or possibly execute arbitrary code via specially crafted devices. Ben Hawkes reported some off by one errors for report descriptors in the Linux kernel's HID stack. A physically proximate attacker could exploit these flaws to cause a denial of service (out-of-bounds write) via a specially crafted device. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-09-15 CVE Reserved
- 2014-09-28 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-399: Resource Management Errors
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8 | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2014/09/15/7 | Mailing List |
|
https://bugzilla.redhat.com/show_bug.cgi?id=1142072 | Issue Tracking |
URL | Date | SRC |
---|---|---|
https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://tracker.ceph.com/issues/8979 | 2023-11-07 | |
http://tracker.ceph.com/issues/9560 | 2023-11-07 | |
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2376-1 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2377-1 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2378-1 | 2023-11-07 | |
http://www.ubuntu.com/usn/USN-2379-1 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 3.4.105 Search vendor "Linux" for product "Linux Kernel" and version " < 3.4.105" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.5 < 3.10.55 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.5 < 3.10.55" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.11 < 3.12.29 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.12.29" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.13 < 3.14.19 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 < 3.14.19" | - |
Affected
| ||||||
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | >= 3.15 < 3.16.3 Search vendor "Linux" for product "Linux Kernel" and version " >= 3.15 < 3.16.3" | - |
Affected
|