First published: Mon Mar 17 2014(Updated: )
Description of the problem: Some occurences in the netfilter tree use skb_header_pointer() in the following way ... struct dccp_hdr _dh, *dh; ... skb_header_pointer(skb, dataoff, sizeof(_dh), &dh); ... where dh itself is a pointer that is being passed as the copy buffer. Instead, we need to use &_dh as the forth argument so that we're copying the data into an actual buffer that sits on the stack. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. References: <a href="http://www.openwall.com/lists/oss-security/2014/03/17/3">http://www.openwall.com/lists/oss-security/2014/03/17/3</a> Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2bc780499aa3">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2bc780499aa3</a> Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b22f5126a24b">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b22f5126a24b</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.57 | |
Linux Kernel | >=3.3<3.4.86 | |
Linux Kernel | >=3.5<3.10.36 | |
Linux Kernel | >=3.11<3.12.17 | |
Linux Kernel | >=3.13.0<3.13.9 | |
Ubuntu Linux | =10.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2523 is classified as a medium severity vulnerability that can potentially lead to a denial of service due to incorrect handling of memory in the netfilter tree.
To fix CVE-2014-2523, you should upgrade your Linux Kernel to a version that is not affected, specifically versions later than 3.13.9 or any fixed package version like 5.10.223-1.
CVE-2014-2523 affects Linux Kernel versions from 3.2.57 up to 3.13.9 and includes several versions in between.
Yes, Ubuntu Linux version 10.04 is affected by CVE-2014-2523 and requires updating to a patched kernel version.
CVE-2014-2523 involves the skb_header_pointer function within the netfilter tree, which improperly manages memory pointers.