SB2014070903 - Race condition in Linux kernel



SB2014070903 - Race condition in Linux kernel

Published: July 9, 2014 Updated: August 10, 2020

Security Bulletin ID SB2014070903
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Race condition (CVE-ID: CVE-2014-4699)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.


Remediation

Install update from vendor's website.

References