Details
-
Bug
-
Resolution: Fixed
-
Major
-
None
-
None
-
3
-
16854
Description
- A flaw was found in the way the Linux kernel handled GS segment register
base switching when recovering from a #SS (stack segment) fault on an
erroneous return to user space. A local, unprivileged user could use this
flaw to escalate their privileges on the system. (CVE-2014-9322, Important)
Bugs fixed (https://bugzilla.redhat.com/):
1172806 - CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
Attachments
Issue Links
- is related to
-
LU-6063 conf-sanity test_76a fails on RHEL7, SLES12
-
- Resolved
-
Activity
Resolution | New: Fixed [ 1 ] | |
Status | Original: Open [ 1 ] | New: Resolved [ 5 ] |
Fix Version/s | New: Lustre 2.7.0 [ 10631 ] |
Description |
Original:
* A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-9322, Important) |
New:
* A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2014-9322, Important) Bugs fixed (https://bugzilla.redhat.com/): 1172806 - CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility |
Summary | Original: kernel update [RHEL7 3.10.0-123.13.2.el7] | New: Kernel update [RHEL7 3.10.0-123.13.2.el7] |