Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-9322

Опубликовано: 15 дек. 2014
Источник: redhat
CVSS3: 8.4
CVSS2: 7.2
EPSS Низкий

Описание

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.

Отчет

This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 4, 5, 6, and 7, and Red Hat Enterprise MRG 2. Future Linux kernel updates for the respective releases will address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux Extended Update Support 5.6kernelAffected
Red Hat Enterprise Linux 4 Extended Lifecycle SupportkernelFixedRHSA-2015:000905.01.2015
Red Hat Enterprise Linux 5kernelFixedRHSA-2014:200817.12.2014
Red Hat Enterprise Linux 5.6 Long LifekernelFixedRHSA-2014:203122.12.2014
Red Hat Enterprise Linux 5.9 Extended Update SupportkernelFixedRHSA-2014:202922.12.2014
Red Hat Enterprise Linux 6kernelFixedRHSA-2014:199716.12.2014
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2014:202822.12.2014
Red Hat Enterprise Linux 6.4 Extended Update SupportkernelFixedRHSA-2014:203022.12.2014
Red Hat Enterprise Linux 6.5 Extended Update SupportkernelFixedRHSA-2014:200917.12.2014
Red Hat Enterprise Linux 7kernelFixedRHSA-2014:201018.12.2014

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-841
https://bugzilla.redhat.com/show_bug.cgi?id=1172806kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility

EPSS

Процентиль: 90%
0.05763
Низкий

8.4 High

CVSS3

7.2 High

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 10 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

CVSS3: 7.8
nvd
больше 10 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

CVSS3: 7.8
debian
больше 10 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not ...

CVSS3: 7.8
github
около 3 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

oracle-oval
больше 10 лет назад

ELSA-2014-2010: kernel security update (IMPORTANT)

EPSS

Процентиль: 90%
0.05763
Низкий

8.4 High

CVSS3

7.2 High

CVSS2

Уязвимость CVE-2014-9322