CVE-2014-9419

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
References
Link Resource
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
http://rhn.redhat.com/errata/RHSA-2015-1081.html
http://www.debian.org/security/2015/dsa-3128
http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
http://www.openwall.com/lists/oss-security/2014/12/25/1
http://www.securityfocus.com/bid/71794
http://www.ubuntu.com/usn/USN-2515-1
http://www.ubuntu.com/usn/USN-2516-1
http://www.ubuntu.com/usn/USN-2517-1
http://www.ubuntu.com/usn/USN-2518-1
http://www.ubuntu.com/usn/USN-2541-1
http://www.ubuntu.com/usn/USN-2542-1
https://bugzilla.redhat.com/show_bug.cgi?id=1177260 Vendor Advisory
https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html
http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html
http://rhn.redhat.com/errata/RHSA-2015-1081.html
http://www.debian.org/security/2015/dsa-3128
http://www.mandriva.com/security/advisories?name=MDVSA-2015:058
http://www.openwall.com/lists/oss-security/2014/12/25/1
http://www.securityfocus.com/bid/71794
http://www.ubuntu.com/usn/USN-2515-1
http://www.ubuntu.com/usn/USN-2516-1
http://www.ubuntu.com/usn/USN-2517-1
http://www.ubuntu.com/usn/USN-2518-1
http://www.ubuntu.com/usn/USN-2541-1
http://www.ubuntu.com/usn/USN-2542-1
https://bugzilla.redhat.com/show_bug.cgi?id=1177260 Vendor Advisory
https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:20

Type Values Removed Values Added
References () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e - () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147864.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html - () http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147973.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html - () http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00020.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html - () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html -
References () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html - () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00015.html -
References () http://rhn.redhat.com/errata/RHSA-2015-1081.html - () http://rhn.redhat.com/errata/RHSA-2015-1081.html -
References () http://www.debian.org/security/2015/dsa-3128 - () http://www.debian.org/security/2015/dsa-3128 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:058 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:058 -
References () http://www.openwall.com/lists/oss-security/2014/12/25/1 - () http://www.openwall.com/lists/oss-security/2014/12/25/1 -
References () http://www.securityfocus.com/bid/71794 - () http://www.securityfocus.com/bid/71794 -
References () http://www.ubuntu.com/usn/USN-2515-1 - () http://www.ubuntu.com/usn/USN-2515-1 -
References () http://www.ubuntu.com/usn/USN-2516-1 - () http://www.ubuntu.com/usn/USN-2516-1 -
References () http://www.ubuntu.com/usn/USN-2517-1 - () http://www.ubuntu.com/usn/USN-2517-1 -
References () http://www.ubuntu.com/usn/USN-2518-1 - () http://www.ubuntu.com/usn/USN-2518-1 -
References () http://www.ubuntu.com/usn/USN-2541-1 - () http://www.ubuntu.com/usn/USN-2541-1 -
References () http://www.ubuntu.com/usn/USN-2542-1 - () http://www.ubuntu.com/usn/USN-2542-1 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1177260 - Vendor Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1177260 - Vendor Advisory
References () https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e - () https://github.com/torvalds/linux/commit/f647d7c155f069c1a068030255c300663516420e -

07 Nov 2023, 02:23

Type Values Removed Values Added
References
  • {'url': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e', 'name': 'http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=f647d7c155f069c1a068030255c300663516420e', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f647d7c155f069c1a068030255c300663516420e -

Information

Published : 2014-12-26 00:59

Updated : 2024-11-21 02:20


NVD link : CVE-2014-9419

Mitre link : CVE-2014-9419

CVE.ORG link : CVE-2014-9419


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor