Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-4699


The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.


Published

2014-07-09T11:07:03.477

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.9 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.4

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-362

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System linux linux_kernel < 3.2.61 Yes
Operating System linux linux_kernel < 3.4.97 Yes
Operating System linux linux_kernel < 3.10.47 Yes
Operating System linux linux_kernel < 3.12.25 Yes
Operating System linux linux_kernel < 3.14.11 Yes
Operating System linux linux_kernel < 3.15.4 Yes
Operating System debian debian_linux 7.0 Yes
Operating System canonical ubuntu_linux 10.04 Yes
Operating System canonical ubuntu_linux 12.04 Yes
Operating System canonical ubuntu_linux 13.10 Yes
Operating System canonical ubuntu_linux 14.04 Yes

References