First published: Sun Sep 28 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
redhat enterprise Linux desktop | =7.0 | |
Red Hat Enterprise Linux HPC Node | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Linux Kernel | >=3.6<3.10.55 | |
Linux Kernel | >=3.11<3.12.29 | |
Linux Kernel | >=3.13<3.14.19 | |
Linux Kernel | >=3.15<3.16.3 | |
Ubuntu Linux | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7145 is classified as a denial of service vulnerability that can lead to a client system crash caused by a NULL pointer dereference.
To mitigate CVE-2014-7145, it is recommended to upgrade to versions of the Linux kernel that are patched, such as 3.16.3 or later.
CVE-2014-7145 affects various Linux kernel versions before 3.16.3 and specific distributions including Debian, Red Hat Enterprise Linux, and Ubuntu.
CVE-2014-7145 enables a remote attacker to cause a denial of service through the deletion of the IPC$ share.
Yes, CVE-2014-7145 can be exploited remotely by manipulating CIFS connections to induce a denial of service.