First published: Tue Apr 01 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.13.7 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2673 has a severity rating that indicates a local user could exploit it to potentially gain unauthorized access or control.
To fix CVE-2014-2673, upgrade the Linux kernel to version 3.13.7 or later.
The affected Linux kernel versions for CVE-2014-2673 are all versions prior to 3.13.7.
CVE-2014-2673 is classified as a vulnerability in the handling of clone and fork system calls in the Linux kernel.
No, CVE-2014-2673 can only be exploited by local users on the affected systems.