First published: Thu Feb 06 2014(Updated: )
Last updated 24 July 2024
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <3.13.4 | |
SUSE Linux Enterprise Server | =10-sp4 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 | |
Linux Kernel | <3.13.4 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1874 is considered to have a high severity due to its potential to cause a crash in the Linux kernel.
To fix CVE-2014-1874, update the Linux kernel to version 5.10.223-1 or later, or ensure your system is running a patched version.
CVE-2014-1874 affects multiple versions, including specific versions of Ubuntu and SUSE Linux, as well as any Linux kernel before 3.13.4.
Exploiting CVE-2014-1874 can cause a denial of service but does not directly allow unauthorized access.
Users or processes with CAP_MAC_ADMIN privileges on affected Linux systems are primarily impacted by CVE-2014-1874.