Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 552746 - Kernel: DoS via outbound network traffic that triggers extension loading (CVE-2014-9715)
Summary: Kernel: DoS via outbound network traffic that triggers extension loading (CVE...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2015-06-21 13:49 UTC by GLSAMaker/CVETool Bot
Modified: 2022-03-25 22:39 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2015-06-21 13:49:29 UTC
CVE-2014-9715 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9715):
  include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in
  the Linux kernel before 3.14.5 uses an insufficiently large data type for
  certain extension data, which allows local users to cause a denial of
  service (NULL pointer dereference and OOPS) via outbound network traffic
  that triggers extension loading, as demonstrated by configuring a PPTP
  tunnel in a NAT environment.