The __get_user_asm_ex macro in arch/x86/include/asm/uaccess.h in the Linux kernel before 4.7.5 does not initialize a certain integer variable, which allows local users to obtain sensitive information from kernel stack memory by triggering failure of a get_user_ex call.
No PoCs from references.
- https://github.com/thdusdl1219/CVE-Study
- https://github.com/vincent-deng/veracode-container-security-finding-parser