CVE-2014-9322

CVSS V2 High 7.2 CVSS V3 High 7.8
Description
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Overview
  • CVE ID
  • CVE-2014-9322
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2014-12-17T11:59:02
  • Last Modified Date
  • 2023-01-17T21:29:39
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 3.17.5
cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* 1 OR
cpe:2.3:o:opensuse:evergreen:11.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:suse:suse_linux_enterprise_server:10:sp4:*:*:ltss:*:*:* 1 OR
cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:C/I:C/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 7.2
  • Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 10
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
References
Reference URL Reference Tags
http://www.openwall.com/lists/oss-security/2014/12/15/6 Mailing List Patch Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1172806 Issue Tracking Patch Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5 Mailing List Patch Vendor Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6f442be2fb22be02cafa606f1769fa1e6f894441 Mailing List Patch Vendor Advisory
https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441 Patch Third Party Advisory
http://secunia.com/advisories/62336 Broken Link
http://www.ubuntu.com/usn/USN-2491-1 Third Party Advisory
http://www.exploit-db.com/exploits/36266 Exploit Third Party Advisory VDB Entry
http://osvdb.org/show/osvdb/115919 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html Mailing List Third Party Advisory
http://www.zerodayinitiative.com/advisories/ZDI-16-170 Third Party Advisory VDB Entry
https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities Permissions Required Third Party Advisory
http://source.android.com/security/bulletin/2016-04-02.html Patch Third Party Advisory
http://marc.info/?l=bugtraq&m=142722450701342&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=142722544401658&w=2 Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2015-0009.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-2031.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-2028.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-2008.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2014-1998.html Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:20:33 Added to TrackCVE
2022-12-02 02:45:30 2014-12-17T11:59Z 2014-12-17T11:59:02 CVE Published Date updated
2022-12-02 02:45:30 2020-08-14T18:23:33 CVE Modified Date updated
2022-12-02 02:45:30 Analyzed Vulnerability Status updated
2022-12-08 18:07:21 Analyzed Undergoing Analysis Vulnerability Status updated
2023-01-17 22:06:22 2023-01-17T21:29:39 CVE Modified Date updated
2023-01-17 22:06:22 Undergoing Analysis Analyzed Vulnerability Status updated