CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:P/A:P
EPSS
Percentile
90.1%
The net_get_random_once implementation in net/core/utils.c in the Linux
kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not
perform the intended slow-path operation to initialize random seeds, which
makes it easier for remote attackers to spoof or disrupt IP communication
by leveraging the predictability of TCP sequence numbers, TCP and UDP port
numbers, and IP ID values.
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support per apw, this was fixed in passing in 3.13.0-39.66~precise1, part of https://ubuntu.com/security/notices/USN-2394-1, but not documented in the changelog or the USN. |
secondlookforensics.com/ngro-linux-kernel-bug/
launchpad.net/bugs/cve/CVE-2014-7284
nvd.nist.gov/vuln/detail/CVE-2014-7284
security-tracker.debian.org/tracker/CVE-2014-7284
ubuntu.com/security/notices/USN-2288-1
ubuntu.com/security/notices/USN-2290-1
ubuntu.com/security/notices/USN-2394-1
www.cve.org/CVERecord?id=CVE-2014-7284