CVE Vulnerabilities

CVE-2014-9322

Improper Privilege Management

Published: Dec 17, 2014 | Modified: Apr 12, 2025
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.2 HIGH
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V2
7.2 IMPORTANT
AV:L/AC:L/Au:N/C:C/I:C/A:C
RedHat/V3
8.4 IMPORTANT
CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

Weakness

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*3.2.65 (excluding)
Linux_kernelLinux3.3 (including)3.4.106 (excluding)
Linux_kernelLinux3.5 (including)3.10.62 (excluding)
Linux_kernelLinux3.11 (including)3.12.35 (excluding)
Linux_kernelLinux3.13 (including)3.14.26 (excluding)
Linux_kernelLinux3.15 (including)3.16.35 (excluding)
Linux_kernelLinux3.17 (including)3.17.5 (excluding)
Red Hat Enterprise Linux 4 Extended Lifecycle SupportRedHatkernel-0:2.6.9-106.EL*
Red Hat Enterprise Linux 5RedHatkernel-0:2.6.18-400.1.1.el5*
Red Hat Enterprise Linux 5.6 Long LifeRedHatkernel-0:2.6.18-238.54.1.el5*
Red Hat Enterprise Linux 5.9 Extended Update SupportRedHatkernel-0:2.6.18-348.29.1.el5*
Red Hat Enterprise Linux 6RedHatkernel-0:2.6.32-504.3.3.el6*
Red Hat Enterprise Linux 6.2 Advanced Update SupportRedHatkernel-0:2.6.32-220.57.1.el6*
Red Hat Enterprise Linux 6.4 Extended Update SupportRedHatkernel-0:2.6.32-358.51.2.el6*
Red Hat Enterprise Linux 6.5 Extended Update SupportRedHatkernel-0:2.6.32-431.40.2.el6*
Red Hat Enterprise Linux 7RedHatkernel-0:3.10.0-123.13.2.el7*
Red Hat Enterprise MRG 2RedHatkernel-rt-0:3.10.58-rt62.60.el6rt*
LinuxUbuntuesm-infra-legacy/trusty*
LinuxUbuntulucid*
LinuxUbuntuprecise*
LinuxUbuntuprecise/esm*
LinuxUbuntutrusty*
LinuxUbuntutrusty/esm*
LinuxUbuntuupstream*
LinuxUbuntuutopic*
Linux-2.6Ubuntuupstream*
Linux-armadaxpUbuntuprecise*
Linux-armadaxpUbuntuupstream*
Linux-awsUbuntuupstream*
Linux-ec2Ubuntulucid*
Linux-ec2Ubuntuupstream*
Linux-floUbuntutrusty*
Linux-floUbuntuupstream*
Linux-floUbuntuutopic*
Linux-floUbuntuvivid*
Linux-floUbuntuvivid/stable-phone-overlay*
Linux-floUbuntuwily*
Linux-floUbuntuxenial*
Linux-floUbuntuyakkety*
Linux-fsl-imx51Ubuntulucid*
Linux-fsl-imx51Ubuntuupstream*
Linux-gkeUbuntuupstream*
Linux-goldfishUbuntutrusty*
Linux-goldfishUbuntuupstream*
Linux-goldfishUbuntuutopic*
Linux-goldfishUbuntuvivid*
Linux-goldfishUbuntuwily*
Linux-goldfishUbuntuxenial*
Linux-goldfishUbuntuyakkety*
Linux-goldfishUbuntuzesty*
Linux-grouperUbuntutrusty*
Linux-grouperUbuntuupstream*
Linux-grouperUbuntuutopic*
Linux-hweUbuntuupstream*
Linux-hwe-edgeUbuntuupstream*
Linux-linaro-omapUbuntuprecise*
Linux-linaro-omapUbuntuupstream*
Linux-linaro-sharedUbuntuprecise*
Linux-linaro-sharedUbuntuupstream*
Linux-linaro-vexpressUbuntuprecise*
Linux-linaro-vexpressUbuntuupstream*
Linux-lts-quantalUbuntuprecise*
Linux-lts-quantalUbuntuupstream*
Linux-lts-raringUbuntuprecise*
Linux-lts-raringUbuntuprecise/esm*
Linux-lts-raringUbuntuupstream*
Linux-lts-saucyUbuntuprecise*
Linux-lts-saucyUbuntuupstream*
Linux-lts-trustyUbuntuprecise*
Linux-lts-trustyUbuntuprecise/esm*
Linux-lts-trustyUbuntuupstream*
Linux-lts-utopicUbuntutrusty*
Linux-lts-utopicUbuntuupstream*
Linux-lts-vividUbuntuupstream*
Linux-lts-wilyUbuntuupstream*
Linux-lts-xenialUbuntuupstream*
Linux-maguroUbuntutrusty*
Linux-maguroUbuntuupstream*
Linux-makoUbuntutrusty*
Linux-makoUbuntuupstream*
Linux-makoUbuntuutopic*
Linux-makoUbuntuvivid*
Linux-makoUbuntuvivid/stable-phone-overlay*
Linux-makoUbuntuwily*
Linux-makoUbuntuxenial*
Linux-makoUbuntuyakkety*
Linux-mantaUbuntutrusty*
Linux-mantaUbuntuupstream*
Linux-mantaUbuntuutopic*
Linux-mantaUbuntuvivid*
Linux-mantaUbuntuwily*
Linux-mvl-doveUbuntulucid*
Linux-mvl-doveUbuntuupstream*
Linux-qcm-msmUbuntulucid*
Linux-qcm-msmUbuntuprecise*
Linux-qcm-msmUbuntuupstream*
Linux-raspi2Ubuntuupstream*
Linux-raspi2Ubuntuvivid/ubuntu-core*
Linux-snapdragonUbuntuupstream*
Linux-ti-omap4Ubuntuprecise*
Linux-ti-omap4Ubuntuupstream*

Potential Mitigations

References