Hide Forgot
Linux kernel built with the BPF interpreter support in the networking core is vulnerable to an out of bounds buffer access flaw. It occurs when accessing a netlink attribute from the skb->data buffer. It could lead to DoS via kernel crash or leakage of kernel memory bytes to user space. An unprivileged user/program could use this flaw to crash the system kernel resulting in DoS or leak kernel memory bytes to user space. Upstream fix: ------------- -> https://git.kernel.org/linus/05ab8f2647e4221cbdb3856dd7d32bd5407316b3 Introduced by: -------------- -> https://git.kernel.org/linus/4738c1db1593687713869fa69e733eebc7b0d6d8 -> https://git.kernel.org/linus/d214c7537bbf2f247991fb65b3420b0b3d712c67 Reference: ---------- -> http://seclists.org/oss-sec/2014/q2/282
Statement: This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5.
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1096784]
kernel-3.14.4-200.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.14.4-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0786 https://rhn.redhat.com/errata/RHSA-2014-0786.html
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2014:0913 https://rhn.redhat.com/errata/RHSA-2014-0913.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0981 https://rhn.redhat.com/errata/RHSA-2014-0981.html