CVE-2014-7826NULL Pointer Dereference in Kernel

Severity
7.8HIGHNVD
EPSS
0.0%
top 86.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateMay 13

Description

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

NVDlinux/linux_kernel2.6.323.2.65+6
Debianlinux/linux_kernel< 3.16.7-ckt2-1+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-5jvp-w9hf-v844: kernel/trace/trace_syscalls2022-05-13
CVEList
CVE-2014-7826: kernel/trace/trace_syscalls2014-11-10
OSV
CVE-2014-7826: kernel/trace/trace_syscalls2014-11-10

📋Vendor Advisories

9
Ubuntu
Linux kernel (Utopic HWE) vulnerabilities2014-12-12
Ubuntu
Linux kernel vulnerabilities2014-12-12
Ubuntu
Linux kernel vulnerabilities2014-12-12
Ubuntu
Linux kernel vulnerabilities2014-12-12
Ubuntu
Linux kernel (Trusty HWE) vulnerabilities2014-12-12

💬Community

2
Bugzilla
CVE-2014-7825 CVE-2014-7826 kernel: insufficient syscall number validation in perf and ftrace subsystems2014-11-07
Bugzilla
CVE-2014-7826 CVE-2014-7825 kernel: insufficient syscall number validation in perf and ftrace subsystems [fedora-all]2014-11-07
CVE-2014-7826 — NULL Pointer Dereference in Kernel | cvebase