arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2014-9147 | arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space. |
![]() |
USN-2443-1 | Linux kernel vulnerabilities |
![]() |
USN-2445-1 | Linux kernel (Trusty HWE) vulnerabilities |
![]() |
USN-2446-1 | Linux kernel vulnerabilities |
![]() |
USN-2447-1 | Linux kernel (Utopic HWE) vulnerabilities |
![]() |
USN-2448-1 | Linux kernel vulnerabilities |
![]() |
USN-2462-1 | Linux kernel vulnerabilities |
![]() |
USN-2464-1 | Linux kernel (OMAP4) vulnerabilities |
![]() |
USN-2491-1 | Linux kernel (EC2) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:40:25.229Z
Reserved: 2014-12-07T00:00:00
Link: CVE-2014-9322

No data.

Status : Deferred
Published: 2014-12-17T11:59:02.383
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9322


No data.