Vulnerability & Exploit Database

Displaying all 5 entries

Results for: CVE-2014-9428 Back to search

USN-2518-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 8
  • Published: January 02, 2015

The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.

USN-2517-1: Linux kernel (Utopic HWE) vulnerabilities Vulnerability

  • Severity: 8
  • Published: January 02, 2015

The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.

USN-2516-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 8
  • Published: January 02, 2015

The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.

USN-2515-1: Linux kernel (Trusty HWE) vulnerabilities Vulnerability

  • Severity: 8
  • Published: January 02, 2015

The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.

SUSE: CVE-2014-9428: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: January 02, 2015

The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.