#VU41492 Race condition in Linux kernel - CVE-2014-4699

 

#VU41492 Race condition in Linux kernel - CVE-2014-4699

Published: July 9, 2014 / Updated: August 11, 2020


Vulnerability identifier: #VU41492
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2014-4699
CWE-ID: CWE-362
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Linux kernel
Software vendor:
Linux Foundation

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.


Remediation

Install update from vendor's website.

External links