CVE-2014-7284

Source
https://nvd.nist.gov/vuln/detail/CVE-2014-7284
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2014-7284.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2014-7284
Downstream
Related
Published
2014-10-13T10:55:08Z
Modified
2025-08-09T20:01:26Z
Summary
[none]
Details

The netgetrandom_once implementation in net/core/utils.c in the Linux kernel 3.13.x and 3.14.x before 3.14.5 on certain Intel processors does not perform the intended slow-path operation to initialize random seeds, which makes it easier for remote attackers to spoof or disrupt IP communication by leveraging the predictability of TCP sequence numbers, TCP and UDP port numbers, and IP ID values.

References

Affected packages