First published: Thu Dec 25 2014(Updated: )
It was found that the Linux kernel is vulnerable to an information leakage flaw in the way certain segment registers and TLS are changed during context switch. An unprivileged user/process could use this flaw to leak other process's user space TLS base address. Upstream fix: ------------- -> <a href="https://git.kernel.org/linus/f647d7c155f069c1a068030255c300663516420e">https://git.kernel.org/linus/f647d7c155f069c1a068030255c300663516420e</a> Reference: ---------- -> <a href="http://www.openwall.com/lists/oss-security/2014/12/18/17">http://www.openwall.com/lists/oss-security/2014/12/18/17</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <=3.18.1 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.133-1 6.12.22-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9419 has a medium severity rating due to its potential for information leakage.
To fix CVE-2014-9419, update your Linux kernel to a version above 3.18.1 or install the patched kernel versions.
CVE-2014-9419 affects unprivileged users of the Linux kernel versions up to 3.18.1.
CVE-2014-9419 is an information leakage vulnerability related to context switching in the Linux kernel.
CVE-2014-9419 is not directly exploitable remotely as it requires an unprivileged user process to be running on the affected system.