Description
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-9147 | arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space. |
Ubuntu USN |
USN-2443-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2445-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2447-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2448-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2462-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2464-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2491-1 | Linux kernel (EC2) vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Google
Subscribe
Android
Subscribe
Linux
Subscribe
Linux Kernel
Subscribe
Opensuse
Subscribe
Evergreen
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Mrg
Subscribe
Rhel Els
Subscribe
Rhel Eus
Subscribe
Rhel Mission Critical
Subscribe
Suse
Subscribe
Suse Linux Enterprise Server
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:40:25.229Z
Reserved: 2014-12-07T00:00:00.000Z
Link: CVE-2014-9322
No data.
Status : Deferred
Published: 2014-12-17T11:59:02.383
Modified: 2025-04-12T10:46:40.837
Link: CVE-2014-9322
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN