Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 509160 (CVE-2014-2889) - Kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target (CVE-2014-2889)
Summary: Kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target...
Status: RESOLVED FIXED
Alias: CVE-2014-2889
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-30 10:39 UTC by Agostino Sarubbo
Modified: 2022-03-25 22:01 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-04-30 10:39:56 UTC
CVE-2014-2889 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2889):
  Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c 
  in the Linux kernel before 3.1.8, when BPF JIT is enabled, allows local 
  users to cause a denial of service (system crash) or possibly gain privileges 
  via a long jump after a conditional jump.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-08-10 21:55:12 UTC
CVE-2014-2889 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2889):
  Off-by-one error in the bpf_jit_compile function in
  arch/x86/net/bpf_jit_comp.c in the Linux kernel before 3.1.8, when BPF JIT
  is enabled, allows local users to cause a denial of service (system crash)
  or possibly gain privileges via a long jump after a conditional jump.