7.8
CVE-2014-9322
- EPSS 5.76%
- Published 17.12.2014 11:59:02
- Last modified 12.04.2025 10:46:40
- Source cve@mitre.org
- Teams watchlist Login
- Open Login
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version < 3.2.65
Linux ≫ Linux Kernel Version >= 3.3 < 3.4.106
Linux ≫ Linux Kernel Version >= 3.5 < 3.10.62
Linux ≫ Linux Kernel Version >= 3.11 < 3.12.35
Linux ≫ Linux Kernel Version >= 3.13 < 3.14.26
Linux ≫ Linux Kernel Version >= 3.15 < 3.16.35
Linux ≫ Linux Kernel Version >= 3.17 < 3.17.5
Redhat ≫ Enterprise Linux Eus Version5.6
Canonical ≫ Ubuntu Linux Version10.04 SwEdition-
Suse ≫ Suse Linux Enterprise Server Version10 Updatesp4 SwEditionltss
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 5.76% | 0.901 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-269 Improper Privilege Management
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.