First published: Tue Apr 01 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.2<3.2.56 | |
Linux Kernel | >=3.3<3.4.92 | |
Linux Kernel | >=3.5<3.10.42 | |
Linux Kernel | >=3.11<3.12.15 | |
Linux Kernel | >=3.13<3.13.7 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2672 is classified as a denial of service vulnerability that may lead to system crashes due to a race condition.
To fix CVE-2014-2672, upgrade to a Linux kernel version greater than 3.13.7.
CVE-2014-2672 affects Linux kernel versions prior to 3.13.7, including versions from 3.2 to 3.12.
Yes, CVE-2014-2672 can be exploited remotely by sending a large amount of network traffic to the affected system.
The vulnerability in CVE-2014-2672 is caused by a race condition in the ath_tx_aggr_sleep function.