First published: Tue Sep 16 2014(Updated: )
A flaw was found in the kernels handling of ceph authentication tickets. The auth reply could be returned to a client unvalidated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.64 | |
Linux Kernel | >=3.3<3.4.105 | |
Linux Kernel | >=3.5<3.10.55 | |
Linux Kernel | >=3.11<3.12.29 | |
Linux Kernel | >=3.13<3.14.19 | |
Linux Kernel | >=3.15<3.16.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6418 has a high severity due to the potential for remote attacks exploiting unvalidated authentication replies.
To fix CVE-2014-6418, upgrade to a kernel version that is 3.16.3 or higher, or apply the relevant patches provided by your Linux distribution.
CVE-2014-6418 affects the Linux kernel versions before 3.16.3, as well as various Ubuntu and Debian releases.
CVE-2014-6418 allows remote attackers to authenticate unvalidated client requests, leading to potential unauthorized access.
As of now, there is no widely known public exploit specifically targeting CVE-2014-6418.