First published: Mon May 01 2017(Updated: )
Last updated 24 July 2024
Credit: security@android.com security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | >3.16.45 | |
Linux Linux kernel | >=3.17<3.18.52 | |
Google Android | <=7.1.1 | |
Linux Linux kernel | >3.10<3.16.45 | |
Linux Linux kernel | =3.10 | |
Linux Linux kernel | =3.10-rc1 | |
Linux Linux kernel | =3.10-rc2 | |
Linux Linux kernel | =3.10-rc3 | |
Linux Linux kernel | =3.10-rc4 | |
Linux Linux kernel | =3.10-rc5 | |
Linux Linux kernel | =3.10-rc6 | |
Linux Linux kernel | =3.10-rc7 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.112-1 6.11.7-1 6.11.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9940 is a vulnerability in the Linux kernel that allows local users to gain privileges or cause a denial of service through a use-after-free issue in the regulator_ena_gpio_free function.
CVE-2014-9940 has a severity rating of 7 (high).
Ubuntu Linux versions 3.13.0-123.172 and Linux kernel versions up to 3.19 are affected by CVE-2014-9940.
To fix CVE-2014-9940, you should update your Linux kernel to version 3.19 or higher.
You can find more information about CVE-2014-9940 on the following references: [http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=60a2362f769cf549dc466134efe71c8bf9fbaaba](http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=60a2362f769cf549dc466134efe71c8bf9fbaaba), [https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba](https://github.com/torvalds/linux/commit/60a2362f769cf549dc466134efe71c8bf9fbaaba), [https://source.android.com/security/bulletin/2017-05-01](https://source.android.com/security/bulletin/2017-05-01)