Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-4699

Опубликовано: 04 июл. 2014
Источник: redhat
CVSS2: 6.9
EPSS Низкий

Описание

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.

Отчет

This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:092423.07.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2014:094928.07.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:092523.07.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:092323.07.2014
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2014:091322.07.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-642
https://bugzilla.redhat.com/show_bug.cgi?id=1115927kernel: x86_64: ptrace: sysret to non-canonical address

EPSS

Процентиль: 79%
0.01327
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

nvd
больше 11 лет назад

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

debian
больше 11 лет назад

The Linux kernel before 3.15.4 on Intel processors does not properly r ...

github
больше 3 лет назад

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

fstec
больше 11 лет назад

Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии

EPSS

Процентиль: 79%
0.01327
Низкий

6.9 Medium

CVSS2