Oval Definition:oval:com.ubuntu.precise:def:20147841000
Revision Date:2014-11-29Version:1
Title:CVE-2014-7841 on Ubuntu 12.04 LTS (precise) - medium.
Description:The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk. A null pointer dereference flaw was discovered in the the Linux kernel's SCTP implementation when ASCONF is used. A remote attacker could exploit this flaw to cause a denial of service (system crash) via a malformed INIT chunk.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2014-7841
Platform(s):Ubuntu 12.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 12.04 LTS (precise) is installed.
  • AND Package Information
  • The 'linux' package in precise was vulnerable but has been fixed (note: '3.2.0-73.108').
  • OR The 'linux-armadaxp' package in precise was vulnerable but has been fixed (note: '3.2.0-1642.60').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was pending [3.5.0-58.85~precise1] OEM release').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needs-triage now end-of-life').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was pending [3.11.0-31.52~precise1] OEM release').
  • OR The 'linux-lts-trusty' package in precise was vulnerable but has been fixed (note: '3.13.0-44.73~precise1').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR The 'linux-ti-omap4' package in precise was vulnerable but has been fixed (note: '3.2.0-1457.77').
  • BACK