CVE-2014-3144 linux


2017-12-29 21:58
2017-06-18 07:32
2017-06-16 19:10
2017-04-01 19:29
2017-01-05 17:40


The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
buster linux 3.14.4-1
jessie linux 3.14.4-1
sid linux 3.14.4-1
stretch linux 3.14.4-1
wheezy linux 3.2.57-3+deb7u2