6.9

CVE-2014-4699

Exploit

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version >= 2.6.17 < 3.2.61
LinuxLinux Kernel Version >= 3.3 < 3.4.97
LinuxLinux Kernel Version >= 3.5 < 3.10.47
LinuxLinux Kernel Version >= 3.11 < 3.12.25
LinuxLinux Kernel Version >= 3.13 < 3.14.11
LinuxLinux Kernel Version >= 3.15 < 3.15.4
DebianDebian Linux Version7.0
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version13.10
CanonicalUbuntu Linux Version14.04 SwEditionesm
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.01% 0.763
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.9 3.4 10
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

http://openwall.com/lists/oss-security/2014/07/05/4
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2014/07/08/16
Third Party Advisory
Mailing List
http://openwall.com/lists/oss-security/2014/07/08/5
Third Party Advisory
Mailing List
http://www.exploit-db.com/exploits/34134
Third Party Advisory
Exploit
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1115927
Patch
Third Party Advisory
Issue Tracking