4.9

CVE-2014-7207

A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging (1) tun or (2) macvtap device access.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version3.2
LinuxLinux Kernel Version3.2 HwPlatformx86
LinuxLinux Kernel Version3.2 Updaterc2
LinuxLinux Kernel Version3.2 Updaterc3
LinuxLinux Kernel Version3.2 Updaterc4
LinuxLinux Kernel Version3.2 Updaterc5
LinuxLinux Kernel Version3.2 Updaterc6
LinuxLinux Kernel Version3.2 Updaterc7
LinuxLinux Kernel Version3.2.1
LinuxLinux Kernel Version3.2.1 HwPlatformx86
LinuxLinux Kernel Version3.2.2
LinuxLinux Kernel Version3.2.3
LinuxLinux Kernel Version3.2.4
LinuxLinux Kernel Version3.2.5
LinuxLinux Kernel Version3.2.6
LinuxLinux Kernel Version3.2.7
LinuxLinux Kernel Version3.2.8
LinuxLinux Kernel Version3.2.9
LinuxLinux Kernel Version3.2.10
LinuxLinux Kernel Version3.2.11
LinuxLinux Kernel Version3.2.12
LinuxLinux Kernel Version3.2.13
LinuxLinux Kernel Version3.2.14
LinuxLinux Kernel Version3.2.15
LinuxLinux Kernel Version3.2.16
LinuxLinux Kernel Version3.2.17
LinuxLinux Kernel Version3.2.18
LinuxLinux Kernel Version3.2.19
LinuxLinux Kernel Version3.2.20
LinuxLinux Kernel Version3.2.21
LinuxLinux Kernel Version3.2.22
LinuxLinux Kernel Version3.2.23
LinuxLinux Kernel Version3.2.24
LinuxLinux Kernel Version3.2.25
LinuxLinux Kernel Version3.2.26
LinuxLinux Kernel Version3.2.27
LinuxLinux Kernel Version3.2.28
LinuxLinux Kernel Version3.2.29
LinuxLinux Kernel Version3.2.30
LinuxLinux Kernel Version3.2.31
LinuxLinux Kernel Version3.2.32
LinuxLinux Kernel Version3.2.33
LinuxLinux Kernel Version3.2.34
LinuxLinux Kernel Version3.2.35
LinuxLinux Kernel Version3.2.36
LinuxLinux Kernel Version3.2.37
LinuxLinux Kernel Version3.2.38
LinuxLinux Kernel Version3.2.39
LinuxLinux Kernel Version3.2.40
LinuxLinux Kernel Version3.2.41
LinuxLinux Kernel Version3.2.42
LinuxLinux Kernel Version3.2.43
LinuxLinux Kernel Version3.2.44
LinuxLinux Kernel Version3.2.45
LinuxLinux Kernel Version3.2.46
LinuxLinux Kernel Version3.2.47
LinuxLinux Kernel Version3.2.48
LinuxLinux Kernel Version3.2.49
LinuxLinux Kernel Version3.2.50
LinuxLinux Kernel Version3.2.51
LinuxLinux Kernel Version3.2.52
LinuxLinux Kernel Version3.2.53
LinuxLinux Kernel Version3.2.54
LinuxLinux Kernel Version3.2.55
LinuxLinux Kernel Version3.2.56
LinuxLinux Kernel Version3.2.57
LinuxLinux Kernel Version3.2.58
LinuxLinux Kernel Version3.2.59
LinuxLinux Kernel Version3.2.60
LinuxLinux Kernel Version3.2.61
LinuxLinux Kernel Version3.2.62
LinuxLinux Kernel Version3.2.63
LinuxLinux Kernel Version3.25
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.258
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.9 3.9 6.9
AV:L/AC:L/Au:N/C:C/I:N/A:N