An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
3.13.0-165.2154.4.0-1034.374.15.0-1037.39~14.04.24.4.0-139.165~14.04.14.4.0-139.1654.4.0-1072.824.15.0-1032.34~16.04.14.15.0-1037.39~16.04.14.15.0-1027.28~16.04.14.15.0-45.48~16.04.1Exploitability
AV:LAC:LPR:LUI:NScope
S:UImpact
C:HI:NA:NCVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N