First published: Tue Mar 18 2014(Updated: )
An information leak flaw was found in the way skb_zerocopy() copied skbs that are backed by userspace buffers (for example vhost-net and recent xen netback). Once the source skb is consumed, ubuf destructor is called and potentially releases the corresponding userspace buffers, which can then for example be repurposed, while the destination skb is still pointing to the them. Upstream patch: <a href="https://lkml.org/lkml/2014/3/20/421">https://lkml.org/lkml/2014/3/20/421</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:3.10.0-123.4.2.el7 | 0:3.10.0-123.4.2.el7 |
Linux Kernel | >=3.0<=3.13.6 | |
Ubuntu | =14.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2568 is classified as a medium severity vulnerability due to its potential for information leakage in user-space memory.
To fix CVE-2014-2568, you should upgrade to kernel version 0:3.10.0-123.4.2.el7 or later for Red Hat systems.
CVE-2014-2568 affects Linux kernel versions from 3.0 to 3.13.6 inclusive.
CVE-2014-2568 affects Red Hat, Ubuntu 14.04, and Debian-based systems with specific kernel versions.
Yes, CVE-2014-2568 involves an information leak due to the handling of userspace buffers in skb_zerocopy().