From ${URL} : Linux kernel which supports tkill/tgkill routines is vulnerable to an information leakage flaw. It occurs when routine tkill(2) or tgkill(2) is used send signal to thread. A user/program could use this flaw to leak kernel memory bytes. Upstream fix: ------------- -> https://git.kernel.org/linus/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f Reference: ---------- -> http://www.openwall.com/lists/oss-security/2013/06/02/1
CVE-2013-2141 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2141): The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
In 3.9 onwards