{"id":"CVE-2014-9322","details":"arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.","modified":"2026-04-10T03:44:48.824819Z","published":"2014-12-17T11:59:02Z","related":["MGASA-2015-0006","MGASA-2015-0075","MGASA-2015-0076","MGASA-2015-0077","MGASA-2015-0078","SUSE-RU-2015:0621-1","SUSE-SU-2015:0481-1","SUSE-SU-2015:0581-1","SUSE-SU-2015:0652-1","SUSE-SU-2015:0736-1","SUSE-SU-2015:1174-1","SUSE-SU-2015:1376-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=142722450701342&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=142722544401658&w=2"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1998.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-2008.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-2028.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-2031.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-0009.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/62336"},{"type":"ADVISORY","url":"http://source.android.com/security/bulletin/2016-04-02.html"},{"type":"ADVISORY","url":"http://www.exploit-db.com/exploits/36266"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2014/12/15/6"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2491-1"},{"type":"ADVISORY","url":"http://www.zerodayinitiative.com/advisories/ZDI-16-170"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1172806"},{"type":"ADVISORY","url":"https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441"},{"type":"ADVISORY","url":"https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities"},{"type":"ADVISORY","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=142722450701342&w=2"},{"type":"ARTICLE","url":"http://marc.info/?l=bugtraq&m=142722544401658&w=2"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2014/12/15/6"},{"type":"ARTICLE","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5"},{"type":"EVIDENCE","url":"http://www.exploit-db.com/exploits/36266"},{"type":"FIX","url":"http://source.android.com/security/bulletin/2016-04-02.html"},{"type":"FIX","url":"http://www.openwall.com/lists/oss-security/2014/12/15/6"},{"type":"FIX","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1172806"},{"type":"FIX","url":"https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441"},{"type":"FIX","url":"https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1172806"},{"type":"REPORT","url":"https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities"},{"type":"WEB","url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441"},{"type":"WEB","url":"http://osvdb.org/show/osvdb/115919"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}