4.9 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:C/I:N/A:N
7.2 High
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
10.1%
The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bceaa90240b6019ed73b49965eac7d167610be69
lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html
lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html
lists.opensuse.org/opensuse-security-announce/2015-04/msg00000.html
lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
rhn.redhat.com/errata/RHSA-2014-0159.html
rhn.redhat.com/errata/RHSA-2014-0285.html
seclists.org/oss-sec/2014/q1/29
secunia.com/advisories/55882
secunia.com/advisories/56036
www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4
www.openwall.com/lists/oss-security/2013/11/28/13
www.ubuntu.com/usn/USN-2107-1
www.ubuntu.com/usn/USN-2108-1
www.ubuntu.com/usn/USN-2109-1
www.ubuntu.com/usn/USN-2110-1
www.ubuntu.com/usn/USN-2113-1
www.ubuntu.com/usn/USN-2117-1
www.ubuntu.com/usn/USN-2135-1
www.ubuntu.com/usn/USN-2136-1
www.ubuntu.com/usn/USN-2138-1
www.ubuntu.com/usn/USN-2139-1
www.ubuntu.com/usn/USN-2141-1
bugzilla.redhat.com/show_bug.cgi?id=1035875
github.com/torvalds/linux/commit/bceaa90240b6019ed73b49965eac7d167610be69