First published: Mon Feb 09 2015(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <3.18.5 | |
Debian | =7.0 | |
Debian | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =14.10 | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
Oracle Linux | =7 | |
Linux Kernel | <3.18.5 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9644 has a medium severity rating due to its potential to allow local users to load arbitrary kernel modules.
To fix CVE-2014-9644, update the Linux kernel to a version beyond 3.18.5 or apply the recommended patches provided by your Linux distribution's vendor.
CVE-2014-9644 affects Linux Kernel versions 2.6.38 through 3.18 and specific versions of Debian and Ubuntu Linux.
CVE-2014-9644 cannot be exploited remotely as it requires local access for a user to load kernel modules.
Exploiting CVE-2014-9644 could allow an attacker with local access to gain elevated privileges on the system.