Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 505650 (CVE-2014-2568)

Summary: Kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied (CVE-2014-2568)
Product: Gentoo Security Reporter: Agostino Sarubbo <ago>
Component: KernelAssignee: Gentoo Kernel Security <security-kernel>
Status: RESOLVED FIXED    
Severity: normal CC: kernel
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
Whiteboard:
Package list:
Runtime testing required: ---

Description Agostino Sarubbo gentoo-dev 2014-03-25 11:52:51 UTC
CVE-2014-2568 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2568):

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the 
Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by 
leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the 
skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-08-10 21:57:15 UTC
CVE-2014-2568 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2568):
  Use-after-free vulnerability in the nfqnl_zcopy function in
  net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6
  allows attackers to obtain sensitive information from kernel memory by
  leveraging the absence of a certain orphaning operation. NOTE: the affected
  code was moved to the skb_zerocopy function in net/core/skbuff.c before the
  vulnerability was announced.
Comment 2 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-03-25 19:38:00 UTC
Fixed in 3.14 as 36d5fe6a000790f56039afe26834265db0a3ad4c