CVE-2014-9715 PUBLISHED

include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.

EPSS 0.04% · 13.3th percentile

Risk Scores

EPSS Score
0.04%
13.3th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSlinux0, 3.11.0-12.19, 3.12.0-1.3

Timeline

References

Open in Interactive Console →