Description
Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-2603 | Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced. |
Ubuntu USN |
USN-2239-1 | Linux kernel (Saucy HWE) vulnerabilities |
Ubuntu USN |
USN-2240-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2241-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2260-1 | Linux kernel (Trusty HWE) vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T10:21:35.474Z
Reserved: 2014-03-20T00:00:00.000Z
Link: CVE-2014-2568
No data.
Status : Modified
Published: 2014-03-24T16:40:48.403
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-2568
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN