Описание
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.
Отчет
This issue does affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 4, 5, 6, and 7, and Red Hat Enterprise MRG 2. Future Linux kernel updates for the respective releases will address this issue.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux Extended Update Support 5.6 | kernel | Affected | ||
Red Hat Enterprise Linux 4 Extended Lifecycle Support | kernel | Fixed | RHSA-2015:0009 | 05.01.2015 |
Red Hat Enterprise Linux 5 | kernel | Fixed | RHSA-2014:2008 | 17.12.2014 |
Red Hat Enterprise Linux 5.6 Long Life | kernel | Fixed | RHSA-2014:2031 | 22.12.2014 |
Red Hat Enterprise Linux 5.9 Extended Update Support | kernel | Fixed | RHSA-2014:2029 | 22.12.2014 |
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2014:1997 | 16.12.2014 |
Red Hat Enterprise Linux 6.2 Advanced Update Support | kernel | Fixed | RHSA-2014:2028 | 22.12.2014 |
Red Hat Enterprise Linux 6.4 Extended Update Support | kernel | Fixed | RHSA-2014:2030 | 22.12.2014 |
Red Hat Enterprise Linux 6.5 Extended Update Support | kernel | Fixed | RHSA-2014:2009 | 17.12.2014 |
Red Hat Enterprise Linux 7 | kernel | Fixed | RHSA-2014:2010 | 18.12.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.4 High
CVSS3
7.2 High
CVSS2
Связанные уязвимости
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not ...
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
EPSS
8.4 High
CVSS3
7.2 High
CVSS2