hshivhare67 / Kernel_v3.0.35

Other
0 stars 0 forks source link

CVE-2014-4699 (High) detected in linux-stable-rtv3.8.6 #903

Open mend-bolt-for-github[bot] opened 1 year ago

mend-bolt-for-github[bot] commented 1 year ago

CVE-2014-4699 - High Severity Vulnerability

Vulnerable Library - linux-stable-rtv3.8.6

Julia Cartwright's fork of linux-stable-rt.git

Library home page: https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git

Found in HEAD commit: 22324ae9738f0a1eeb173ff05137c8317c350189

Found in base branch: master

Vulnerable Source Files (1)

Vulnerability Details

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

Publish Date: 2014-07-09

URL: CVE-2014-4699

CVSS 3 Score Details (7.4)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2014-4699

Release Date: 2014-07-09

Fix Resolution: 3.15.4


Step up your Open Source Security Game with Mend here