Lucene search

K
cve[email protected]CVE-2014-2889
HistoryApr 27, 2014 - 12:55 a.m.

CVE-2014-2889

2014-04-2700:55:05
CWE-189
web.nvd.nist.gov
31
cve-2014-2889
off-by-one error
bpf_jit_compile
linux kernel
denial of service
privilege escalation

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Off-by-one error in the bpf_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 3.1.8, when BPF JIT is enabled, allows local users to cause a denial of service (system crash) or possibly gain privileges via a long jump after a conditional jump.

Affected configurations

NVD
Node
linuxlinux_kernelRange3.1.7
OR
linuxlinux_kernelMatch3.0rc1
OR
linuxlinux_kernelMatch3.0rc2
OR
linuxlinux_kernelMatch3.0rc3
OR
linuxlinux_kernelMatch3.0rc4
OR
linuxlinux_kernelMatch3.0rc5
OR
linuxlinux_kernelMatch3.0rc6
OR
linuxlinux_kernelMatch3.0rc7
OR
linuxlinux_kernelMatch3.0.1
OR
linuxlinux_kernelMatch3.0.2
OR
linuxlinux_kernelMatch3.0.3
OR
linuxlinux_kernelMatch3.0.4
OR
linuxlinux_kernelMatch3.0.5
OR
linuxlinux_kernelMatch3.0.6
OR
linuxlinux_kernelMatch3.0.7
OR
linuxlinux_kernelMatch3.0.8
OR
linuxlinux_kernelMatch3.0.9
OR
linuxlinux_kernelMatch3.0.10
OR
linuxlinux_kernelMatch3.0.11
OR
linuxlinux_kernelMatch3.0.12
OR
linuxlinux_kernelMatch3.0.13
OR
linuxlinux_kernelMatch3.0.14
OR
linuxlinux_kernelMatch3.0.15
OR
linuxlinux_kernelMatch3.0.16
OR
linuxlinux_kernelMatch3.0.17
OR
linuxlinux_kernelMatch3.0.18
OR
linuxlinux_kernelMatch3.0.19
OR
linuxlinux_kernelMatch3.0.20
OR
linuxlinux_kernelMatch3.0.21
OR
linuxlinux_kernelMatch3.0.22
OR
linuxlinux_kernelMatch3.0.23
OR
linuxlinux_kernelMatch3.0.24
OR
linuxlinux_kernelMatch3.0.25
OR
linuxlinux_kernelMatch3.0.26
OR
linuxlinux_kernelMatch3.0.27
OR
linuxlinux_kernelMatch3.0.28
OR
linuxlinux_kernelMatch3.0.29
OR
linuxlinux_kernelMatch3.0.30
OR
linuxlinux_kernelMatch3.0.31
OR
linuxlinux_kernelMatch3.0.32
OR
linuxlinux_kernelMatch3.0.33
OR
linuxlinux_kernelMatch3.0.34
OR
linuxlinux_kernelMatch3.0.35
OR
linuxlinux_kernelMatch3.0.36
OR
linuxlinux_kernelMatch3.0.37
OR
linuxlinux_kernelMatch3.0.38
OR
linuxlinux_kernelMatch3.0.39
OR
linuxlinux_kernelMatch3.0.40
OR
linuxlinux_kernelMatch3.0.41
OR
linuxlinux_kernelMatch3.0.42
OR
linuxlinux_kernelMatch3.0.43
OR
linuxlinux_kernelMatch3.0.44
OR
linuxlinux_kernelMatch3.0.45
OR
linuxlinux_kernelMatch3.0.46
OR
linuxlinux_kernelMatch3.0.47
OR
linuxlinux_kernelMatch3.0.48
OR
linuxlinux_kernelMatch3.0.49
OR
linuxlinux_kernelMatch3.0.50
OR
linuxlinux_kernelMatch3.0.51
OR
linuxlinux_kernelMatch3.0.52
OR
linuxlinux_kernelMatch3.0.53
OR
linuxlinux_kernelMatch3.0.54
OR
linuxlinux_kernelMatch3.0.55
OR
linuxlinux_kernelMatch3.0.56
OR
linuxlinux_kernelMatch3.0.57
OR
linuxlinux_kernelMatch3.0.58
OR
linuxlinux_kernelMatch3.0.59
OR
linuxlinux_kernelMatch3.0.60
OR
linuxlinux_kernelMatch3.0.61
OR
linuxlinux_kernelMatch3.0.62
OR
linuxlinux_kernelMatch3.0.63
OR
linuxlinux_kernelMatch3.0.64
OR
linuxlinux_kernelMatch3.0.65
OR
linuxlinux_kernelMatch3.0.66
OR
linuxlinux_kernelMatch3.0.67
OR
linuxlinux_kernelMatch3.0.68
OR
linuxlinux_kernelMatch3.1
OR
linuxlinux_kernelMatch3.1rc1
OR
linuxlinux_kernelMatch3.1rc2
OR
linuxlinux_kernelMatch3.1rc3
OR
linuxlinux_kernelMatch3.1rc4
OR
linuxlinux_kernelMatch3.1.1
OR
linuxlinux_kernelMatch3.1.2
OR
linuxlinux_kernelMatch3.1.3
OR
linuxlinux_kernelMatch3.1.4
OR
linuxlinux_kernelMatch3.1.5
OR
linuxlinux_kernelMatch3.1.6

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%