Skip to content

The Linux kernel before 3.15.4 on Intel processors does...

Moderate severity Unreviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Feb 25, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

References

Published by the National Vulnerability Database Jul 9, 2014
Published to the GitHub Advisory Database May 13, 2022
Last updated Feb 25, 2024

Severity

Moderate

Weaknesses

CVE ID

CVE-2014-4699

GHSA ID

GHSA-j6mr-2j2f-gxh9

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Checking history
See something to contribute? Suggest improvements for this vulnerability.