First published: Fri Jun 20 2014(Updated: )
A bounds check error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions. (CVE-2014-3144) A remainder calculation error was discovered in the socket filter subsystem of the Linux kernel. A local user could exploit this flaw to cause a denial of service (system crash) via crafted BPF instructions. (CVE-2014-3145)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-2.6.32-366-ec2 | <2.6.32-366.80 | 2.6.32-366.80 |
Ubuntu gir1.2-packagekitglib-1.0 | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-2252-1 is categorized as a denial of service vulnerability that could lead to system crashes.
To fix USN-2252-1, upgrade the affected Linux kernel to a version higher than 2.6.32-366.80.
USN-2252-1 affects Ubuntu 10.04 with the linux-image-2.6.32-366-ec2 package.
A local user can exploit USN-2252-1 by using crafted BPF instructions to trigger a denial of service.
USN-2252-1 is a bounds check error in the socket filter subsystem of the Linux kernel.