First published: Wed Dec 10 2014(Updated: )
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.65 | |
Linux Kernel | >=3.3<3.4.106 | |
Linux Kernel | >=3.5<3.10.62 | |
Linux Kernel | >=3.11<3.12.35 | |
Linux Kernel | >=3.13<3.14.26 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.17.5 | |
redhat enterprise Linux eus | =5.6 | |
Ubuntu Linux | =10.04 | |
openSUSE Evergreen | =11.4 | |
SUSE Linux Enterprise Server | =10-sp4 | |
Android | =6.0 | |
Android | =6.0.1 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.16-1 | |
Linux kernel | <3.2.65 | |
Linux kernel | >=3.3<3.4.106 | |
Linux kernel | >=3.5<3.10.62 | |
Linux kernel | >=3.11<3.12.35 | |
Linux kernel | >=3.13<3.14.26 | |
Linux kernel | >=3.15<3.16.35 | |
Linux kernel | >=3.17<3.17.5 | |
Red Hat Enterprise Linux Server EUS | =5.6 | |
Evergreen ILS | =11.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-9322 is classified as high due to its potential to allow local users to gain elevated privileges.
To fix CVE-2014-9322, upgrade to a Linux kernel version that is 3.17.5 or newer or ensure you are on a fixed version like 5.10.223-1 or 6.1.123-1.
CVE-2014-9322 affects various Linux kernel versions prior to 3.17.5, including those on operating systems like Debian, Ubuntu, and SUSE.
CVE-2014-9322 cannot be exploited remotely as it requires local user access to the system.
The impact of CVE-2014-9322 allows a local user to gain unauthorized privileges, potentially compromising system security.