Логотип exploitDog
bind:CVE-2014-2568
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-2568

Количество 6

Количество 6

ubuntu логотип

CVE-2014-2568

около 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

CVSS2: 2.9
EPSS: Низкий
redhat логотип

CVE-2014-2568

больше 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

CVSS2: 2.9
EPSS: Низкий
nvd логотип

CVE-2014-2568

около 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

CVSS2: 2.9
EPSS: Низкий
debian логотип

CVE-2014-2568

около 11 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfil ...

CVSS2: 2.9
EPSS: Низкий
github логотип

GHSA-wcjr-fm9w-6wrp

около 3 лет назад

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

EPSS: Низкий
oracle-oval логотип

ELSA-2014-0786

почти 11 лет назад

ELSA-2014-0786: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-2568

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

CVSS2: 2.9
0%
Низкий
около 11 лет назад
redhat логотип
CVE-2014-2568

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

CVSS2: 2.9
0%
Низкий
больше 11 лет назад
nvd логотип
CVE-2014-2568

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

CVSS2: 2.9
0%
Низкий
около 11 лет назад
debian логотип
CVE-2014-2568

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfil ...

CVSS2: 2.9
0%
Низкий
около 11 лет назад
github логотип
GHSA-wcjr-fm9w-6wrp

Use-after-free vulnerability in the nfqnl_zcopy function in net/netfilter/nfnetlink_queue_core.c in the Linux kernel through 3.13.6 allows attackers to obtain sensitive information from kernel memory by leveraging the absence of a certain orphaning operation. NOTE: the affected code was moved to the skb_zerocopy function in net/core/skbuff.c before the vulnerability was announced.

0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2014-0786

ELSA-2014-0786: kernel security, bug fix, and enhancement update (IMPORTANT)

почти 11 лет назад

Уязвимостей на страницу