First published: Mon Sep 15 2014(Updated: )
A flaw was reported in the Linux kernel where the libceph auth token could cause the kernel to incorrectly handle kmalloc failure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.4.105 | |
Linux Kernel | >=3.5<3.10.55 | |
Linux Kernel | >=3.11<3.12.29 | |
Linux Kernel | >=3.13<3.14.19 | |
Linux Kernel | >=3.15<3.16.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6417 has a medium severity rating due to its potential impact on the Linux kernel's ability to handle memory allocation failures.
To fix CVE-2014-6417, upgrade to the latest versions of the Linux kernel available, specifically versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
CVE-2014-6417 affects Linux kernel versions prior to 3.16.3, including those between 3.4.105 and 3.16.3.
CVE-2014-6417 primarily affects the libceph authentication component in the Linux kernel.
CVE-2014-6417 is primarily a local vulnerability that could impact system stability due to improper handling of memory allocation.