Revision Date: | 2016-06-27 | Version: | 1 | Title: | CVE-2014-9903 on Ubuntu 12.04 LTS (precise) - low. | Description: | The sched_read_attr function in kernel/sched/core.c in the Linux kernel 3.14-rc before 3.14-rc4 uses an incorrect size, which allows local users to obtain sensitive information from kernel stack memory via a crafted sched_getattr system call.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2014-9903
| Platform(s): | Ubuntu 12.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 12.04 LTS (precise) is installed. AND Package Information
NOT While related to the CVE in some way, the 'linux' package in precise is not affected.
OR NOT While related to the CVE in some way, the 'linux-armadaxp' package in precise is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'end-of-life').
OR NOT While related to the CVE in some way, the 'linux-lts-trusty' package in precise is not affected.
OR While related to the CVE in some way, a decision has been made to ignore it (note: 'abandoned').
OR NOT While related to the CVE in some way, the 'linux-ti-omap4' package in precise is not affected.
|
|