First published: Tue Jan 13 2015(Updated: )
A null pointer dereference flaw was discovered in the the Linux kernel's SCTP implementation when ASCONF is used. A remote attacker could exploit this flaw to cause a denial of service (system crash) via a malformed INIT chunk. (CVE-2014-7841) A race condition with MMIO and PIO transactions in the KVM (Kernel Virtual Machine) subsystem of the Linux kernel was discovered. A guest OS user could exploit this flaw to cause a denial of service (guest OS crash) via a specially crafted application. (CVE-2014-7842) Miloš Prchlík reported a flaw in how the ARM64 platform handles a single byte overflow in __clear_user. A local user could exploit this flaw to cause a denial of service (system crash) by reading one byte beyond a /dev/zero page boundary. (CVE-2014-7843) A stack buffer overflow was discovered in the ioctl command handling for the Technotrend/Hauppauge USB DEC devices driver. A local user could exploit this flaw to cause a denial of service (system crash) or possibly gain privileges. (CVE-2014-8884)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.16.0-29-generic | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.16.0-29-generic-lpae | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.16.0-29-lowlatency | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.16.0-29-powerpc-e500mc | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.16.0-29-powerpc-smp | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.16.0-29-powerpc64-emb | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 | |
All of | ||
ubuntu/linux-image-3.16.0-29-powerpc64-smp | <3.16.0-29.39~14.04.1 | 3.16.0-29.39~14.04.1 |
Ubuntu 22.04 LTS | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-2467-1 is categorized as a denial of service vulnerability that can lead to system crashes.
To fix USN-2467-1, update to the patched kernel version 3.16.0-29.39~14.04.1 or later.
Exploitation of USN-2467-1 can result in a system crash and unavailability of services.
USN-2467-1 affects Ubuntu 14.04 LTS running specific versions of the Linux kernel packages.
The null pointer dereference flaw described in USN-2467-1 was discovered in the Linux kernel's SCTP implementation.