{ "schema_version": "1.4.0", "id": "GHSA-h8qx-jqqh-5mjc", "modified": "2025-04-12T12:43:08Z", "published": "2022-05-13T01:23:22Z", "aliases": [ "CVE-2014-9322" ], "details": "arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9322" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/6f442be2fb22be02cafa606f1769fa1e6f894441" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1172806" }, { "type": "WEB", "url": "https://help.joyent.com/entries/98788667-Security-Advisory-ZDI-CAN-3263-ZDI-CAN-3284-and-ZDI-CAN-3364-Vulnerabilities" }, { "type": "WEB", "url": "https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.17.5" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f442be2fb22be02cafa606f1769fa1e6f894441" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6f442be2fb22be02cafa606f1769fa1e6f894441" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=142722450701342&w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=142722544401658&w=2" }, { "type": "WEB", "url": "http://osvdb.org/show/osvdb/115919" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1998.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-2008.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-2028.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-2031.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2015-0009.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/62336" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2016-04-02.html" }, { "type": "WEB", "url": "http://www.exploit-db.com/exploits/36266" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/12/15/6" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2491-1" }, { "type": "WEB", "url": "http://www.zerodayinitiative.com/advisories/ZDI-16-170" } ], "database_specific": { "cwe_ids": [ "CWE-269" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-12-17T11:59:00Z" } }