CVE Vulnerabilities

CVE-2014-8181

Improper Initialization

Published: Nov 06, 2019 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The kernel in Red Hat Enterprise Linux 7 and MRG-2 does not clear garbage data for SG_IO buffer, which may leaking sensitive information to userspace.

Weakness

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_linuxRedhat7.0 (including)7.0 (including)
Enterprise_mrgRedhat2.0 (including)2.0 (including)
LinuxUbuntuwily*
Linux-floUbuntutrusty*
Linux-floUbuntuwily*
Linux-goldfishUbuntutrusty*
Linux-goldfishUbuntuwily*
Linux-grouperUbuntutrusty*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-vexpressUbuntuprecise*
Linux-lts-quantalUbuntuprecise*
Linux-lts-raringUbuntuprecise*
Linux-lts-saucyUbuntuprecise*
Linux-lts-utopicUbuntutrusty*
Linux-lts-wilyUbuntutrusty*
Linux-maguroUbuntutrusty*
Linux-makoUbuntutrusty*
Linux-makoUbuntuwily*
Linux-mantaUbuntutrusty*
Linux-mantaUbuntuwily*
Linux-qcm-msmUbuntuprecise*
Linux-raspi2Ubuntuwily*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable’s type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interpreted as 0, false, or an equivalent value depending on the context in which the variable is accessed.

References