Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-9322

Опубликовано: 17 дек. 2014
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8

Описание

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

РелизСтатусПримечание
devel

not-affected

4.10.0-19.21
esm-infra-legacy/trusty

not-affected

3.13.0-43.72
esm-infra/xenial

not-affected

4.2.0-16.19
lucid

released

2.6.32-71.138
precise

released

3.2.0-74.109
precise/esm

not-affected

3.2.0-74.109
trusty

released

3.13.0-43.72
trusty/esm

not-affected

3.13.0-43.72
upstream

released

3.18~rc6
utopic

released

3.16.0-28.37

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

released

3.2.0-1642.61
precise/esm

DNE

precise was released [3.2.0-1642.61]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

4.4.0-1002.2
esm-infra/xenial

not-affected

4.4.0-1001.10
precise

DNE

precise/esm

DNE

trusty

not-affected

4.4.0-1002.2
trusty/esm

not-affected

4.4.0-1002.2
upstream

released

3.18~rc6
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

released

2.6.32-375.92
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.18~rc6
utopic

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

4.4.0-1003.3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.18~rc6
utopic

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.18~rc6
utopic

ignored

end of life
vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.8.0-36.36~16.04.1
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

4.8.0-36.36~16.04.1
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life, was pending
precise/esm

DNE

precise was ignored [was pending [3.5.0-60.87~precise1] OEM release]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life, was needs-triage
precise/esm

ignored

end of life, was needs-triage
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

ignored

end of life, was pending
precise/esm

DNE

precise was ignored [was pending [3.11.0-32.53~precise1] OEM release]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

released

3.13.0-43.72~precise1
precise/esm

not-affected

3.13.0-43.72~precise1
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [3.16.0-28.37~14.04.1]]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

released

3.16.0-28.37~14.04.1
trusty/esm

DNE

trusty was released [3.16.0-28.37~14.04.1]
upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [3.19.0-18.18~14.04.1]]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

not-affected

3.19.0-18.18~14.04.1
trusty/esm

DNE

trusty was not-affected [3.19.0-18.18~14.04.1]
upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected [4.2.0-18.22~14.04.1]]
precise

DNE

precise/esm

DNE

trusty

not-affected

4.2.0-18.22~14.04.1
trusty/esm

DNE

trusty was not-affected [4.2.0-18.22~14.04.1]
upstream

released

3.18~rc6
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

4.4.0-13.29~14.04.1
precise

DNE

precise/esm

DNE

trusty

not-affected

4.4.0-13.29~14.04.1
trusty/esm

not-affected

4.4.0-13.29~14.04.1
upstream

released

3.18~rc6
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.18~rc6
utopic

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
lucid

DNE

precise

DNE

precise/esm

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

released

3.18~rc6
utopic

ignored

end of life
vivid

ignored

end of life

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was ignored [abandoned]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

4.10.0-1004.6
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
vivid

DNE

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

released

4.2.0-1014.21

Показывать по

РелизСтатусПримечание
devel

not-affected

4.4.0-1050.54
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

wily

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

DNE

precise

released

3.2.0-1458.78
precise/esm

DNE

precise was released [3.2.0-1458.78]
trusty

DNE

trusty/esm

DNE

upstream

released

3.18~rc6
utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 90%
0.05763
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
redhat
больше 10 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

CVSS3: 7.8
nvd
больше 10 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

CVSS3: 7.8
debian
больше 10 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not ...

CVSS3: 7.8
github
около 3 лет назад

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

oracle-oval
больше 10 лет назад

ELSA-2014-2010: kernel security update (IMPORTANT)

EPSS

Процентиль: 90%
0.05763
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Уязвимость CVE-2014-9322