vendor:
Linux Kernel
by:
Emeric Nasi
7.8
CVSS
HIGH
Stack Segment (SS) segment register
264
CWE
Product Name: Linux Kernel
Affected Version From: 3.0.0
Affected Version To: 3.17.4
Patch Exists: YES
Related CWE: CVE-2014-9322
CPE: o:linux:linux_kernel
Other Scripts:
https://www.infosecmatter.com/nessus-plugin-library/?id=80106, https://www.infosecmatter.com/nessus-plugin-library/?id=82691, https://www.infosecmatter.com/nessus-plugin-library/?id=80070, https://www.infosecmatter.com/nessus-plugin-library/?id=80088, https://www.infosecmatter.com/nessus-plugin-library/?id=79725, https://www.infosecmatter.com/nessus-plugin-library/?id=81164, https://www.infosecmatter.com/nessus-plugin-library/?id=80098, https://www.infosecmatter.com/nessus-plugin-library/?id=80215, https://www.infosecmatter.com/nessus-plugin-library/?id=80216, https://www.infosecmatter.com/nessus-plugin-library/?id=80156
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: x86_64
2014
cve-2014-9322_poc.c
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
Mitigation:
Upgrade to Linux kernel version 3.17.5 or later.