First published: Wed Feb 18 2015(Updated: )
A buffer overflow flaw was found in the way the Linux kernel's eCryptfs implementation decoded encrypted file names. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Upstream fix: ------------- -> <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=942080643bce061c3dd9d5718d3b745dcb39a8bc">https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=942080643bce061c3dd9d5718d3b745dcb39a8bc</a> Reference: ----------- -> <a href="http://seclists.org/oss-sec/2015/q1/582">http://seclists.org/oss-sec/2015/q1/582</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Linux kernel | <=3.18.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Linux Kernel | <=3.18.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9683 is considered a high severity vulnerability due to its potential to cause system crashes and privilege escalation.
To fix CVE-2014-9683, upgrade to the patched versions of the Linux kernel that include the appropriate security updates.
CVE-2014-9683 affects local, unprivileged users on systems running vulnerable versions of the Linux kernel, particularly under Ubuntu and Debian.
The impact of CVE-2014-9683 includes potential system crashes and the ability for exploited users to escalate their privileges.
Yes, versions of the Linux kernel post 3.18.1 and specific patched Debian package versions address CVE-2014-9683.