The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
References
Configurations
History
No history.
Information
Published : 2016-11-28 03:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-9178
Mitre link : CVE-2016-9178
CVE.ORG link : CVE-2016-9178
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor