net/ceph/auth_x.c in Ceph, as used in the Linux kernel before 3.16.3, does not properly validate auth replies, which allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via crafted data from the IP address of a Ceph Monitor.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 02:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c27a3e4d667fdcad3db7b104f75659478e0c68d8 - | |
| References | () http://tracker.ceph.com/issues/8979 - Exploit, Third Party Advisory | |
| References | () http://tracker.ceph.com/issues/9561 - Third Party Advisory | |
| References | () http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.3 - Exploit, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2014/09/15/7 - Mailing List | |
| References | () http://www.ubuntu.com/usn/USN-2376-1 - Third Party Advisory | |
| References | () http://www.ubuntu.com/usn/USN-2377-1 - Third Party Advisory | |
| References | () http://www.ubuntu.com/usn/USN-2378-1 - Third Party Advisory | |
| References | () http://www.ubuntu.com/usn/USN-2379-1 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=1142073 - Issue Tracking, Third Party Advisory | |
| References | () https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8 - Exploit, Third Party Advisory | 
07 Nov 2023, 02:21
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
        
        
  | 
19 May 2023, 16:50
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | 
        
        Canonical ubuntu Linux
         Canonical  | 
|
| CPE | cpe:2.3:o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*  | 
    cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*  | 
| References | (UBUNTU) http://www.ubuntu.com/usn/USN-2377-1 - Third Party Advisory | |
| References | (MLIST) http://www.openwall.com/lists/oss-security/2014/09/15/7 - Mailing List | |
| References | (CONFIRM) https://github.com/torvalds/linux/commit/c27a3e4d667fdcad3db7b104f75659478e0c68d8 - Exploit, Third Party Advisory | |
| References | (UBUNTU) http://www.ubuntu.com/usn/USN-2376-1 - Third Party Advisory | |
| References | (CONFIRM) http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c27a3e4d667fdcad3db7b104f75659478e0c68d8 - Exploit, Vendor Advisory | |
| References | (UBUNTU) http://www.ubuntu.com/usn/USN-2379-1 - Third Party Advisory | |
| References | (CONFIRM) http://tracker.ceph.com/issues/8979 - Exploit, Third Party Advisory | |
| References | (CONFIRM) http://tracker.ceph.com/issues/9561 - Third Party Advisory | |
| References | (UBUNTU) http://www.ubuntu.com/usn/USN-2378-1 - Third Party Advisory | |
| References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1142073 - Issue Tracking, Third Party Advisory | 
Information
                Published : 2014-09-28 10:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-6418
Mitre link : CVE-2014-6418
CVE.ORG link : CVE-2014-6418
JSON object : View
Products Affected
                linux
- linux_kernel
 
canonical
- ubuntu_linux
 
CWE
                
                    
                        
                        CWE-399
                        
            Resource Management Errors
