First published: Wed Apr 02 2014(Updated: )
A Linux kernel built with a Generic IEEE 802.11 Networking Stack (CONFIG_MAC80211) is vulnerable to a crash caused by a race condition in frame transmission path and station wakeup event, in case when it's sleeping. The crash occurs because, mac80211 stack buffers frames when the station is sleeping, and the same are transmitted upon the station's(STA) wakeup. At this point, a buffered TX frame list is being emptied, while a new frame is being added to the RX list. A remote unprivileged user/program could use this flaw to crash the system kernel, resulting in DoS. Upstream fix: ------------- -> <a href="https://git.kernel.org/linus/1d147bfa64293b2723c4fec50922168658e613ba">https://git.kernel.org/linus/1d147bfa64293b2723c4fec50922168658e613ba</a> Reference: ---------- -> <a href="http://seclists.org/oss-sec/2014/q2/7">http://seclists.org/oss-sec/2014/q2/7</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Linux Kernel | <3.2.56 | |
Linux Kernel | >=3.3<3.4.84 | |
Linux Kernel | >=3.5<3.10.34 | |
Linux Kernel | >=3.11<3.12.15 | |
Linux Kernel | >=3.13<3.13.7 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
SUSE Linux Enterprise High Availability | =11-sp3 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2706 has been rated as a high severity vulnerability due to the potential to cause crashes in affected systems.
To fix CVE-2014-2706, you should upgrade your Linux kernel to a version that includes the security patch, specifically 3.13.7 or newer, and appropriate patched versions for specific distributions.
CVE-2014-2706 affects various systems including specific versions of the Linux kernel as well as Google Android and Oracle Linux.
If exploited, CVE-2014-2706 may lead to a crash of the kernel, disrupting the operation of affected systems.
As of now, there are no widely reported active exploits for CVE-2014-2706, but its potential impact necessitates immediate patching.