First published: Wed Apr 02 2014(Updated: )
A Linux kernel built with a Generic IEEE 802.11 Networking Stack (CONFIG_MAC80211) is vulnerable to a crash caused by a race condition in frame transmission path and station wakeup event, in case when it's sleeping. The crash occurs because, mac80211 stack buffers frames when the station is sleeping, and the same are transmitted upon the station's(STA) wakeup. At this point, a buffered TX frame list is being emptied, while a new frame is being added to the RX list. A remote unprivileged user/program could use this flaw to crash the system kernel, resulting in DoS. Upstream fix: ------------- -> <a href="https://git.kernel.org/linus/1d147bfa64293b2723c4fec50922168658e613ba">https://git.kernel.org/linus/1d147bfa64293b2723c4fec50922168658e613ba</a> Reference: ---------- -> <a href="http://seclists.org/oss-sec/2014/q2/7">http://seclists.org/oss-sec/2014/q2/7</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.56 | |
Linux Linux kernel | >=3.3<3.4.84 | |
Linux Linux kernel | >=3.5<3.10.34 | |
Linux Linux kernel | >=3.11<3.12.15 | |
Linux Linux kernel | >=3.13<3.13.7 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Suse Linux Enterprise High Availability Extension | =11-sp3 | |
SUSE SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE SUSE Linux Enterprise Server | =11-sp3 | |
Suse Suse Linux Enterprise Server Vmware | =11-sp3 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.106-3 6.1.112-1 6.11.4-1 6.11.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.