include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that triggers extension loading, as demonstrated by configuring a PPTP tunnel in a NAT environment.
References
Configurations
History
No history.
Information
Published : 2015-05-27 10:59
Updated : 2023-11-07 02:23
NVD link : CVE-2014-9715
Mitre link : CVE-2014-9715
CVE.ORG link : CVE-2014-9715
JSON object : View
Products Affected
linux
- linux_kernel
CWE