First published: Sun Apr 27 2014(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.14.1 | |
openSUSE Evergreen | =11.4 | |
redhat enterprise Linux desktop | =5 | |
redhat enterprise Linux server | =5.0 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =11 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0181 is rated as a high severity vulnerability due to its potential to allow local users to bypass access restrictions.
To fix CVE-2014-0181, you should upgrade your Linux kernel to version 3.14.2 or later.
CVE-2014-0181 affects the Linux kernel versions up to and including 3.14.1, as well as specific versions of OpenSUSE and Red Hat Enterprise Linux.
CVE-2014-0181 requires local access to exploit, making remote exploitation impractical.
Exploitation of CVE-2014-0181 allows local users to modify network configurations, which could lead to further security risks.