First published: Fri Jan 09 2015(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.18.2 | |
redhat enterprise linux aus | =6.6 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =6.6 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.3 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server eus | =7.1 | |
redhat enterprise Linux server eus | =7.2 | |
redhat enterprise Linux server eus | =7.3 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux server eus | =7.7 | |
redhat enterprise Linux server tus | =6.6 | |
redhat enterprise Linux server tus | =7.3 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =6.0 | |
redhat enterprise Linux workstation | =7.0 | |
openSUSE Evergreen | =11.4 | |
openSUSE | =13.1 | |
SUSE Linux Enterprise Desktop with Beagle | =12 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp1 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =12 | |
SUSE Linux Enterprise Software Development Kit | =12 | |
SUSE Linux Enterprise Workstation Extension | =12 | |
Fedoraproject Fedora | =21 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Fedora | =21 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9585 is classified as an information leakage flaw with medium severity.
To fix CVE-2014-9585, it is recommended to upgrade to a patched version of the Linux kernel such as 5.10.223-1, 6.1.119-1, or later.
CVE-2014-9585 affects various Linux kernel versions including 3.18.2 and below, along with several Red Hat Enterprise Linux distributions.
Yes, an unprivileged user could exploit CVE-2014-9585 to gain access to information that should be protected.
CVE-2014-9585 is an information leakage vulnerability caused by insufficient address randomization.