CVE-2014-9903 REJECTED

The sched_read_attr function in kernel/sched/core.c in the Linux kernel 3.14-rc before 3.14-rc4 uses an incorrect size, which allows local users to obtain sensitive information from kernel stack memory via a crafted sched_getattr system call.

EPSS 0.05% · 15.6th percentile

Risk Scores

EPSS Score
0.05%
15.6th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSlinux-hwe0
Ubuntu:14.04:LTSlinux-lts-utopic0
Ubuntu:14.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-raspi20
Ubuntu:14.04:LTSlinux-lts-wily0
Ubuntu:16.04:LTSlinux-aws0
Ubuntu:16.04:LTSlinux-gke0
Ubuntu:14.04:LTSlinux-lts-vivid0
Ubuntu:14.04:LTSlinux-lts-xenial0
Ubuntu:16.04:LTSlinux0
Ubuntu:16.04:LTSlinux-snapdragon0

Timeline

References

Open in Interactive Console →