Lucene search

K
ubuntucveUbuntu.comUB:CVE-2014-7284
HistoryOct 13, 2014 - 12:00 a.m.

CVE-2014-7284

2014-10-1300:00:00
ubuntu.com
ubuntu.com
10

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

EPSS

0.025

Percentile

90.1%

The net_get_random_once implementation in net/core/utils.c in the Linux
kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not
perform the intended slow-path operation to initialize random seeds, which
makes it easier for remote attackers to spoof or disrupt IP communication
by leveraging the predictability of TCP sequence numbers, TCP and UDP port
numbers, and IP ID values.

Bugs

Notes

Author Note
jdstrand android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support per apw, this was fixed in passing in 3.13.0-39.66~precise1, part of https://ubuntu.com/security/notices/USN-2394-1, but not documented in the changelog or the USN.
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchlinux< 3.13.0-32.57UNKNOWN
ubuntu12.04noarchlinux-lts-trusty< 3.13.0-32.57~precise1UNKNOWN

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

EPSS

0.025

Percentile

90.1%