First published: Wed Dec 10 2014(Updated: )
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not ...
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <3.2.65 | |
Linux Kernel | >=3.3<3.4.106 | |
Linux Kernel | >=3.5<3.10.62 | |
Linux Kernel | >=3.11<3.12.35 | |
Linux Kernel | >=3.13<3.14.26 | |
Linux Kernel | >=3.15<3.16.35 | |
Linux Kernel | >=3.17<3.17.5 | |
Red Hat Enterprise Linux Server EUS | =5.6 | |
Ubuntu | =10.04 | |
Evergreen ILS | =11.4 | |
SUSE Linux Enterprise Server | =10-sp4 | |
Android | =6.0 | |
Android | =6.0.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2014-9322 is classified as high due to its potential to allow local users to gain elevated privileges.
To fix CVE-2014-9322, upgrade to a Linux kernel version that is 3.17.5 or newer or ensure you are on a fixed version like 5.10.223-1 or 6.1.123-1.
CVE-2014-9322 affects various Linux kernel versions prior to 3.17.5, including those on operating systems like Debian, Ubuntu, and SUSE.
CVE-2014-9322 cannot be exploited remotely as it requires local user access to the system.
The impact of CVE-2014-9322 allows a local user to gain unauthorized privileges, potentially compromising system security.