include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
References
Configurations
Information
Published : 2015-05-27 03:59
Updated : 2016-12-30 18:59
NVD link : CVE-2014-9715
Mitre link : CVE-2014-9715
JSON object : View
CWE
Products Affected
linux
- linux_kernel


