Vulnerability CVE-2014-3145: Information

Description

The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr_nest function before the vulnerability was announced.

Severity: MEDIUM (4.9)

Published: May 12, 2014
Modified: Nov. 7, 2023
Error type identifier: CWE-125

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
kernel-image-std-defsisyphus3.14.17-alt16.1.87-alt1ALT-PU-2014-2064-1128797Fixed
kernel-image-std-defp103.14.17-alt15.10.213-alt1ALT-PU-2014-2064-1128797Fixed
kernel-image-std-defp93.14.17-alt15.4.274-alt1ALT-PU-2014-2064-1128797Fixed
kernel-image-std-defc9f23.14.17-alt15.10.214-alt0.c9f.2ALT-PU-2014-2064-1128797Fixed
kernel-image-std-defc73.14.18-alt14.4.277-alt0.M70C.1ALT-PU-2014-2116-1129349Fixed
kernel-image-un-defsisyphus3.14.4-alt16.6.28-alt1ALT-PU-2014-1634-1119753Fixed
kernel-image-un-defp103.14.4-alt16.1.85-alt1ALT-PU-2014-1634-1119753Fixed
kernel-image-un-defp93.14.4-alt15.10.215-alt1ALT-PU-2014-1634-1119753Fixed
kernel-image-un-defc10f13.14.4-alt16.1.85-alt0.c10f.1ALT-PU-2014-1634-1119753Fixed
kernel-image-un-defc9f23.14.4-alt15.10.29-alt2ALT-PU-2014-1634-1119753Fixed
kernel-image-un-defc73.14.4-alt14.9.277-alt0.M70C.1ALT-PU-2014-1638-1119815Fixed
usbipsisyphus5.10-alt15.10-alt1ALT-PU-2023-1798-1320453Fixed
usbipsisyphus_e2k5.10-alt15.10-alt1ALT-PU-2023-7452-1-Fixed
usbipp105.10-alt15.10-alt1ALT-PU-2023-1903-1320461Fixed
usbipp10_e2k5.10-alt15.10-alt1ALT-PU-2023-7498-1-Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://github.com/torvalds/linux/commit/05ab8f2647e4221cbdb3856dd7d32bd5407316b3
  • Exploit
  • Patch
  • Third Party Advisory
[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
  • Mailing List
  • Patch
  • Third Party Advisory
58990
  • Broken Link
67321
  • Third Party Advisory
  • VDB Entry
59597
  • Broken Link
60613
  • Not Applicable
59311
  • Not Applicable
http://linux.oracle.com/errata/ELSA-2014-3052.html
  • Third Party Advisory
https://source.android.com/security/bulletin/2017-04-01
  • Patch
  • Third Party Advisory
1038201
  • Third Party Advisory
  • VDB Entry
USN-2264-1
  • Third Party Advisory
USN-2263-1
  • Third Party Advisory
USN-2262-1
  • Third Party Advisory
USN-2261-1
  • Third Party Advisory
USN-2259-1
  • Third Party Advisory
USN-2252-1
  • Third Party Advisory
USN-2251-1
  • Third Party Advisory
DSA-2949
  • Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
      1. Configuration 1

        cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
        End including
        3.14.3

        Configuration 2

        cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*

        cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*

        Configuration 3

        cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*

        cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

        cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*

        Configuration 4

        cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*