CVE-2014-4699
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
09/07/2014
Last modified:
12/04/2025
Description
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
Impact
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.17 (including) | 3.2.61 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.3 (including) | 3.4.97 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.5 (including) | 3.10.47 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.11 (including) | 3.12.25 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.13 (including) | 3.14.11 (excluding) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.15 (including) | 3.15.4 (excluding) |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Db9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
- http://linux.oracle.com/errata/ELSA-2014-0924.html
- http://linux.oracle.com/errata/ELSA-2014-3047.html
- http://linux.oracle.com/errata/ELSA-2014-3048.html
- http://openwall.com/lists/oss-security/2014/07/05/4
- http://openwall.com/lists/oss-security/2014/07/08/16
- http://openwall.com/lists/oss-security/2014/07/08/5
- http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html
- http://secunia.com/advisories/59633
- http://secunia.com/advisories/59639
- http://secunia.com/advisories/59654
- http://secunia.com/advisories/60220
- http://secunia.com/advisories/60380
- http://secunia.com/advisories/60393
- http://www.debian.org/security/2014/dsa-2972
- http://www.exploit-db.com/exploits/34134
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4
- http://www.openwall.com/lists/oss-security/2014/07/04/4
- http://www.osvdb.org/108754
- http://www.ubuntu.com/usn/USN-2266-1
- http://www.ubuntu.com/usn/USN-2267-1
- http://www.ubuntu.com/usn/USN-2268-1
- http://www.ubuntu.com/usn/USN-2269-1
- http://www.ubuntu.com/usn/USN-2270-1
- http://www.ubuntu.com/usn/USN-2271-1
- http://www.ubuntu.com/usn/USN-2272-1
- http://www.ubuntu.com/usn/USN-2273-1
- http://www.ubuntu.com/usn/USN-2274-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1115927
- https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3Db9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
- http://linux.oracle.com/errata/ELSA-2014-0924.html
- http://linux.oracle.com/errata/ELSA-2014-3047.html
- http://linux.oracle.com/errata/ELSA-2014-3048.html
- http://openwall.com/lists/oss-security/2014/07/05/4
- http://openwall.com/lists/oss-security/2014/07/08/16
- http://openwall.com/lists/oss-security/2014/07/08/5
- http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html
- http://secunia.com/advisories/59633
- http://secunia.com/advisories/59639
- http://secunia.com/advisories/59654
- http://secunia.com/advisories/60220
- http://secunia.com/advisories/60380
- http://secunia.com/advisories/60393
- http://www.debian.org/security/2014/dsa-2972
- http://www.exploit-db.com/exploits/34134
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4
- http://www.openwall.com/lists/oss-security/2014/07/04/4
- http://www.osvdb.org/108754
- http://www.ubuntu.com/usn/USN-2266-1
- http://www.ubuntu.com/usn/USN-2267-1
- http://www.ubuntu.com/usn/USN-2268-1
- http://www.ubuntu.com/usn/USN-2269-1
- http://www.ubuntu.com/usn/USN-2270-1
- http://www.ubuntu.com/usn/USN-2271-1
- http://www.ubuntu.com/usn/USN-2272-1
- http://www.ubuntu.com/usn/USN-2273-1
- http://www.ubuntu.com/usn/USN-2274-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1115927
- https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
- https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97