CVE-2014-9428
Publication date 2 January 2015
Last updated 24 July 2024
Ubuntu priority
The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.
From the Ubuntu Security Team
A flaw was discovered in the fragment handling of the B.A.T.M.A.N. Advanced Meshing Protocol in the Linux kernel. A remote attacker could exploit this flaw to cause a denial of service (mesh-node system crash) via fragmented packets.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
14.04 LTS trusty |
Fixed 3.13.0-46.75
|
|
linux-2.6 | ||
14.04 LTS trusty | Not in release | |
linux-armadaxp | ||
14.04 LTS trusty | Not in release | |
linux-ec2 | ||
14.04 LTS trusty | Not in release | |
linux-flo | ||
14.04 LTS trusty | Not in release | |
linux-fsl-imx51 | ||
14.04 LTS trusty | Not in release | |
linux-goldfish | ||
14.04 LTS trusty | Not in release | |
linux-grouper | ||
14.04 LTS trusty | Not in release | |
linux-linaro-omap | ||
14.04 LTS trusty | Not in release | |
linux-linaro-shared | ||
14.04 LTS trusty | Not in release | |
linux-linaro-vexpress | ||
14.04 LTS trusty | Not in release | |
linux-lts-quantal | ||
14.04 LTS trusty | Not in release | |
linux-lts-raring | ||
14.04 LTS trusty | Not in release | |
linux-lts-saucy | ||
14.04 LTS trusty | Not in release | |
linux-lts-trusty | ||
14.04 LTS trusty | Not in release | |
linux-lts-utopic | ||
14.04 LTS trusty |
Fixed 3.16.0-31.41~14.04.1
|
|
linux-lts-vivid | ||
14.04 LTS trusty | Not in release | |
linux-maguro | ||
14.04 LTS trusty | Not in release | |
linux-mako | ||
14.04 LTS trusty | Not in release | |
linux-manta | ||
14.04 LTS trusty | Not in release | |
linux-mvl-dove | ||
14.04 LTS trusty | Not in release | |
linux-qcm-msm | ||
14.04 LTS trusty | Not in release | |
linux-raspi2 | ||
14.04 LTS trusty | Not in release | |
linux-ti-omap4 | ||
14.04 LTS trusty | Not in release | |
Notes
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
References
Related Ubuntu Security Notices (USN)
- USN-2515-1
- Linux kernel (Trusty HWE) vulnerabilities
- 26 February 2015
- USN-2516-1
- Linux kernel vulnerabilities
- 26 February 2015
- USN-2517-1
- Linux kernel (Utopic HWE) vulnerabilities
- 26 February 2015
- USN-2518-1
- Linux kernel vulnerabilities
- 26 February 2015
Other references
- http://thread.gmane.org/gmane.linux.network/343494
- https://lists.open-mesh.org/pipermail/b.a.t.m.a.n/2014-November/012561.html
- https://github.com/torvalds/linux/commit/5b6698b0e4a37053de35cc24ee695b98a7eb712b
- http://www.spinics.net/lists/netdev/msg309425.html
- http://www.openwall.com/lists/oss-security/2014/12/31/7
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=5b6698b0e4a37053de35cc24ee695b98a7eb712b
- http://bugs.debian.org/774155
- https://www.cve.org/CVERecord?id=CVE-2014-9428