Уязвимость CVE-2014-4699: Информация

Описание

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

Опубликовано: 9 июля 2014 г.
Изменено: 16 февраля 2024 г.
Идентификатор типа ошибки: CWE-362

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
kernel-image-std-defsisyphus3.12.24-alt26.1.87-alt1ALT-PU-2014-1904-1123975Исправлено
kernel-image-std-defp103.12.24-alt25.10.213-alt1ALT-PU-2014-1904-1123975Исправлено
kernel-image-std-defp93.12.24-alt25.4.274-alt1ALT-PU-2014-1904-1123975Исправлено
kernel-image-std-defc9f23.12.24-alt25.10.214-alt0.c9f.2ALT-PU-2014-1904-1123975Исправлено
kernel-image-std-defc73.12.24-alt24.4.277-alt0.M70C.1ALT-PU-2014-1924-1124705Исправлено
kernel-image-std-paec9f23.12.24-alt24.19.72-alt1ALT-PU-2014-1909-1123977Исправлено
kernel-image-std-paec73.12.24-alt23.14.28-alt1ALT-PU-2014-1925-1124704Исправлено
kernel-image-un-defsisyphus3.15.4-alt16.6.28-alt1ALT-PU-2014-1903-1123898Исправлено
kernel-image-un-defp103.15.4-alt16.1.85-alt1ALT-PU-2014-1903-1123898Исправлено
kernel-image-un-defp93.15.4-alt15.10.215-alt1ALT-PU-2014-1903-1123898Исправлено
kernel-image-un-defc10f13.15.4-alt16.1.85-alt0.c10f.1ALT-PU-2014-1903-1123898Исправлено
kernel-image-un-defc9f23.15.4-alt15.10.29-alt2ALT-PU-2014-1903-1123898Исправлено
kernel-image-un-defc73.15.5-alt14.9.277-alt0.M70C.1ALT-PU-2014-1923-1124706Исправлено
usbipsisyphus5.10-alt15.10-alt1ALT-PU-2023-1798-1320453Исправлено
usbipsisyphus_e2k5.10-alt15.10-alt1ALT-PU-2023-7452-1-Исправлено
usbipp105.10-alt15.10-alt1ALT-PU-2023-1903-1320461Исправлено
usbipp10_e2k5.10-alt15.10-alt1ALT-PU-2023-7498-1-Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
[oss-security] 20140704 CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
[oss-security] 20140708 Re: CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4
  • Release Notes
  • Vendor Advisory
[oss-security] 20140705 Re: CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1115927
  • Issue Tracking
  • Patch
  • Third Party Advisory
[oss-security] 20140708 Re: CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
  • Patch
  • Third Party Advisory
USN-2269-1
  • Third Party Advisory
USN-2268-1
  • Third Party Advisory
USN-2274-1
  • Third Party Advisory
USN-2273-1
  • Third Party Advisory
USN-2272-1
  • Third Party Advisory
USN-2267-1
  • Third Party Advisory
USN-2271-1
  • Third Party Advisory
DSA-2972
  • Third Party Advisory
USN-2266-1
  • Third Party Advisory
USN-2270-1
  • Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
  • Release Notes
  • Vendor Advisory
59639
  • Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
  • Release Notes
  • Vendor Advisory
59633
  • Third Party Advisory
59654
  • Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97
  • Release Notes
  • Vendor Advisory
http://linux.oracle.com/errata/ELSA-2014-0924.html
  • Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3047.html
  • Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3048.html
  • Third Party Advisory
http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html
  • Exploit
  • Third Party Advisory
  • VDB Entry
34134
  • Exploit
  • Third Party Advisory
  • VDB Entry
60393
  • Third Party Advisory
108754
  • Broken Link
60220
  • Third Party Advisory
60380
  • Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
  • Broken Link
  • Third Party Advisory
    1. Конфигурация 1

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.15
      End excliding
      3.15.4

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.13
      End excliding
      3.14.11

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.11
      End excliding
      3.12.25

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.5
      End excliding
      3.10.47

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.3
      End excliding
      3.4.97

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      2.6.17
      End excliding
      3.2.61

      Конфигурация 2

      cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

      Конфигурация 3

      cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*