arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-9147 | arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space. |
Ubuntu USN |
USN-2443-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2445-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2447-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2448-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2462-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2464-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2491-1 | Linux kernel (EC2) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:40:25.229Z
Reserved: 2014-12-07T00:00:00
Link: CVE-2014-9322
No data.
Status : Deferred
Published: 2014-12-17T11:59:02.383
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9322
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN