From $URL : Linux kernel is vulnerable to an information leakage flaw. This occurs when a process calls routine - sigaction() - to access - sa_restorer - parameter. This parameter points to an address that belongs to its parent process' address space. A user could use this flaw to infer address layout of a process. Reference: ---------- -> https://lkml.org/lkml/2013/3/11/498 -> http://www.openwall.com/lists/oss-security/2013/03/11/8
Patch in mainline 3.9 onwards