Unrated severityNVD Advisory· Published Apr 14, 2014· Updated May 6, 2026
CVE-2014-2851
CVE-2014-2851
Description
Integer overflow in the ping_init_sock function in net/ipv4/ping.c in the Linux kernel through 3.14.1 allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that leverages an improperly managed reference counter.
Affected products
3- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.openwall.com/lists/oss-security/2014/04/11/4nvdMailing ListPatchThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- lkml.org/lkml/2014/4/10/736nvdMailing ListPatchVendor Advisory
- git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/nvdExploitPatchVendor Advisory
- www.debian.org/security/2014/dsa-2926nvdThird Party Advisory
- www.securityfocus.com/bid/66779nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030769nvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/59386nvdBroken Link
- secunia.com/advisories/59599nvdBroken Link
News mentions
0No linked articles in our index yet.