include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
References
Configurations
History
07 Nov 2023, 02:23
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-05-27 10:59
Updated : 2024-02-28 15:21
NVD link : CVE-2014-9715
Mitre link : CVE-2014-9715
CVE.ORG link : CVE-2014-9715
JSON object : View
Products Affected
linux
- linux_kernel
CWE