Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2014-9419

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2014-9419
Last Modified 03 Jun 2015 10:01:25
Published 25 Dec 2014 07:59:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2014-9419

Summary

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.

Vulnerable Systems

Operating System

  • Linux Kernel 3.18.1


References

CONFIRM - https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=1177260

MLIST - [oss-security] 20141225 Re: CVE Request: Linux x86_64 userspace address leak

CONFIRM - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e

UBUNTU - USN-2518-1

UBUNTU - USN-2517-1

UBUNTU - USN-2516-1

UBUNTU - USN-2515-1

DEBIAN - DSA-3128

SUSE - SUSE-SU-2015:0529

MANDRIVA - MDVSA-2015:058

UBUNTU - USN-2542-1

UBUNTU - USN-2541-1

FEDORA - FEDORA-2015-0515

FEDORA - FEDORA-2015-0517

SUSE - SUSE-SU-2015:0736

Related Patches

Novell SUSE 2015:10717 kernel security update for SLE 11 SP3 i586

Novell SUSE 2015:10740 kernel security update for SLE 11 SP3 x86_64


Last Updated: 27 May 2016 11:08:32