Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2014-9322 — Improper Privilege Management in Kernel
Severity
7.8HIGHNVD
OSV7.5
EPSS
5.2%
top 10.03%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 17
Latest updateMay 13
Description
arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9
Affected Packages6 packages
Also affects: Ubuntu Linux 10.04, Enterprise Linux 5.6
Patches
🔴Vulnerability Details
5💥Exploits & PoCs
2📋Vendor Advisories
10💬Community
1Bugzilla▶
CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility↗2014-12-10