First published: Wed Sep 10 2014(Updated: )
A flaw was found in the way the termination condition in the associative array garbage collection functionality was handled when used from the keys subsystem. A local unprivileged user could use this flaw to crash the system. Introduced by: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b2a4df200d570b2c33a57e1ebfa5896e4bc81b69">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b2a4df200d570b2c33a57e1ebfa5896e4bc81b69</a>
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=3.13<3.14.19 | |
Linux Kernel | >=3.15<3.16.3 | |
Linux Kernel | <=3.16.2 | |
Linux Kernel | =3.16.0 | |
Linux Kernel | =3.16.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3631 has a severity level that can lead to a system crash when exploited.
To fix CVE-2014-3631, update your Linux kernel to version 3.16.4 or later.
CVE-2014-3631 affects Linux kernel versions from 3.13 to 3.16.3.
No, CVE-2014-3631 can only be exploited by a local unprivileged user on the system.
CVE-2014-3631 involves a flaw in the garbage collection functionality for associative arrays.