Oval Definition:oval:com.ubuntu.precise:def:20149715000
Revision Date:2015-05-27Version:1
Title:CVE-2014-9715 on Ubuntu 12.04 LTS (precise) - medium.
Description:include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment. Vincent Tondellier discovered an integer overflow in the Linux kernel's netfilter connection tracking accounting of loaded extensions. An attacker on the local area network (LAN) could potential exploit this flaw to cause a denial of service (system crash of targeted system).
Family:unixClass:vulnerability
Status:Reference(s):CVE-2014-9715
Platform(s):Ubuntu 12.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 12.04 LTS (precise) is installed.
  • AND Package Information
  • The 'linux' package in precise was vulnerable but has been fixed (note: '3.2.0-84.121').
  • OR The 'linux-armadaxp' package in precise was vulnerable but has been fixed (note: '3.2.0-1650.70').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was pending [3.5.0-61.90] OEM release').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'was needs-triage now end-of-life').
  • OR The 'linux-lts-saucy' package in precise was vulnerable but has been fixed (note: '3.11.0-22.38~precise1').
  • OR The 'linux-lts-trusty' package in precise was vulnerable but has been fixed (note: '3.13.0-53.87~precise1').
  • OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
  • OR The 'linux-ti-omap4' package in precise was vulnerable but has been fixed (note: '3.2.0-1464.84').
  • BACK