[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-4508Date: (C)2014-06-23   (M)2024-03-25


arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.7
Exploit Score: 3.4
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: MEDIUM
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
SECUNIA-58964
SECUNIA-60564
BID-68126
SUSE-SU-2014:1316
SUSE-SU-2014:1319
USN-2334-1
http://article.gmane.org/gmane.linux.kernel/1726110
http://openwall.com/lists/oss-security/2014/06/20/1
http://www.openwall.com/lists/oss-security/2014/06/20/10
http://www.openwall.com/lists/oss-security/2020/11/12/3
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.61
openSUSE-SU-2015:0566

CPE    2
cpe:/o:linux:linux_kernel:3.15.1
cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
CWE    1
CWE-189
OVAL    39
oval:org.secpod.oval:def:52291
oval:org.secpod.oval:def:78341
oval:org.secpod.oval:def:1503117
oval:org.secpod.oval:def:702197
...

© SecPod Technologies