First published: Thu Jun 12 2014(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.11-1 6.12.12-1 | |
Linux Kernel | <3.14 | |
Red Hat Enterprise Linux | =6.0 | |
Ubuntu Linux | =12.04 | |
SUSE Linux Enterprise Desktop with Beagle | =11-sp3 | |
SUSE Linux Enterprise High Availability | =11-sp3 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
suse linux enterprise server vmware | =11-sp3 | |
F5 BIG-IP Access Policy Manager | >=11.1.0<=11.6.0 | |
F5 BIG-IP Access Policy Manager | =12.0.0 | |
F5 BIG-IP Advanced Firewall Manager | >=11.3.0<=11.6.0 | |
F5 BIG-IP Advanced Firewall Manager | =12.0.0 | |
F5 BIG-IP Analytics | >=11.1.0<=11.6.0 | |
F5 BIG-IP Analytics | =12.0.0 | |
f5 big-ip application acceleration manager | >=11.4.0<=11.6.0 | |
f5 big-ip application acceleration manager | =12.0.0 | |
F5 BIG-IP Application Security Manager | >=11.1.0<=11.6.0 | |
F5 BIG-IP Application Security Manager | =12.0.0 | |
f5 big-ip domain name system | =12.0.0 | |
F5 BIG-IP Edge Gateway | >=11.1.0<=11.3.0 | |
F5 BIG-IP Global Traffic Manager | >=11.1.0<=11.6.0 | |
f5 big-ip link controller | >=11.1.0<=11.6.0 | |
f5 big-ip link controller | =12.0.0 | |
F5 BIG-IP Local Traffic Manager | >=11.1.0<=11.6.0 | |
F5 BIG-IP Local Traffic Manager | =12.0.0 | |
F5 BIG-IP Policy Enforcement Manager | >=11.3.0<=11.6.0 | |
F5 BIG-IP Policy Enforcement Manager | =12.0.0 | |
F5 BIG-IP Protocol Security Manager | >=11.1.0<=11.4.1 | |
F5 BIG-IP WAN Optimization Manager | >=11.1.0<=11.3.0 | |
F5 BIG-IP WebAccelerator | >=11.1.0<=11.3.0 | |
F5 BIG-IQ Application Delivery Controller | =4.5.0 | |
F5 BIG-IQ Cloud and Orchestration | >=4.0.0<=4.5.0 | |
F5 BIG-IQ Device | >=4.2.0<=4.5.0 | |
F5 BIG-IQ Security | >=4.0.0<=4.5.0 | |
F5 Enterprise Manager | >=3.0.0<=3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-4027 has a medium severity rating due to potential information leakage during I/O operations.
To fix CVE-2014-4027, update your Linux kernel to a version that is not affected, such as those listed in the vulnerability report.
CVE-2014-4027 affects specific versions of Linux kernel, including Debian, Red Hat, and various SUSE distributions.
Yes, CVE-2014-4027 can potentially lead to information leakage, which may expose sensitive data.
CVE-2014-4027 impacts I/O operations conducted on behalf of a SCSI initiator, potentially leaking information.