First published: Mon Sep 15 2014(Updated: )
A buffer overflow is present in the method that the kernel uses to handle libceph auth tokens.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.64 | |
Linux Kernel | >=3.3<3.4.105 | |
Linux Kernel | >=3.5<3.10.55 | |
Linux Kernel | >=3.11<3.12.29 | |
Linux Kernel | >=3.13<3.14.19 | |
Linux Kernel | >=3.15<3.16.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6416 is considered a high-severity vulnerability due to its potential to cause a denial of service and memory corruption.
To fix CVE-2014-6416, upgrade to a patched version of the Linux kernel that is above 3.16.3 or apply the relevant security updates provided by your distribution.
CVE-2014-6416 affects various versions of the Linux kernel prior to 3.16.3 and specific Ubuntu versions like 12.04 and 14.04.
Yes, CVE-2014-6416 can be exploited remotely, allowing attackers to potentially cause a denial of service.
CVE-2014-6416 involves a buffer overflow vulnerability in the ceph auth tokens handling in the Linux kernel.