Vulnerability CVE-2014-4699: Information

Description

The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.

Published: July 9, 2014
Modified: Feb. 16, 2024
Error type identifier: CWE-362

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
kernel-image-std-defsisyphus3.12.24-alt26.1.94-alt1ALT-PU-2014-1904-1123975Fixed
kernel-image-std-defp103.12.24-alt25.10.218-alt1ALT-PU-2014-1904-1123975Fixed
kernel-image-std-defp93.12.24-alt25.4.277-alt1ALT-PU-2014-1904-1123975Fixed
kernel-image-std-defc9f23.12.24-alt25.10.214-alt0.c9f.2ALT-PU-2014-1904-1123975Fixed
kernel-image-std-defc73.12.24-alt24.4.277-alt0.M70C.1ALT-PU-2014-1924-1124705Fixed
kernel-image-std-defp113.12.24-alt26.1.91-alt1ALT-PU-2014-1904-1123975Fixed
kernel-image-std-paec9f23.12.24-alt24.19.72-alt1ALT-PU-2014-1909-1123977Fixed
kernel-image-std-paec73.12.24-alt23.14.28-alt1ALT-PU-2014-1925-1124704Fixed
kernel-image-un-defsisyphus3.15.4-alt16.6.34-alt1ALT-PU-2014-1903-1123898Fixed
kernel-image-un-defp103.15.4-alt16.1.90-alt1ALT-PU-2014-1903-1123898Fixed
kernel-image-un-defp93.15.4-alt15.10.218-alt1ALT-PU-2014-1903-1123898Fixed
kernel-image-un-defc10f13.15.4-alt16.1.85-alt0.c10f.1ALT-PU-2014-1903-1123898Fixed
kernel-image-un-defc9f23.15.4-alt15.10.29-alt2ALT-PU-2014-1903-1123898Fixed
kernel-image-un-defc73.15.5-alt14.9.277-alt0.M70C.1ALT-PU-2014-1923-1124706Fixed
kernel-image-un-defp113.15.4-alt16.6.31-alt1ALT-PU-2014-1903-1123898Fixed
usbipsisyphus5.10-alt15.10-alt1ALT-PU-2023-1798-1320453Fixed
usbipsisyphus_e2k5.10-alt15.10-alt1ALT-PU-2023-7452-1-Fixed
usbipp105.10-alt15.10-alt1ALT-PU-2023-1903-1320461Fixed
usbipp10_e2k5.10-alt15.10-alt1ALT-PU-2023-7498-1-Fixed
usbipp115.10-alt15.10-alt1ALT-PU-2023-1798-1320453Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
[oss-security] 20140704 CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
[oss-security] 20140708 Re: CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.4
  • Release Notes
  • Vendor Advisory
[oss-security] 20140705 Re: CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=1115927
  • Issue Tracking
  • Patch
  • Third Party Advisory
[oss-security] 20140708 Re: CVE-2014-4699: Linux ptrace bug
  • Mailing List
  • Third Party Advisory
https://github.com/torvalds/linux/commit/b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
  • Patch
  • Third Party Advisory
USN-2269-1
  • Third Party Advisory
USN-2268-1
  • Third Party Advisory
USN-2274-1
  • Third Party Advisory
USN-2273-1
  • Third Party Advisory
USN-2272-1
  • Third Party Advisory
USN-2267-1
  • Third Party Advisory
USN-2271-1
  • Third Party Advisory
DSA-2972
  • Third Party Advisory
USN-2266-1
  • Third Party Advisory
USN-2270-1
  • Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.47
  • Release Notes
  • Vendor Advisory
59639
  • Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.14.11
  • Release Notes
  • Vendor Advisory
59633
  • Third Party Advisory
59654
  • Third Party Advisory
https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.97
  • Release Notes
  • Vendor Advisory
http://linux.oracle.com/errata/ELSA-2014-0924.html
  • Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3047.html
  • Third Party Advisory
http://linux.oracle.com/errata/ELSA-2014-3048.html
  • Third Party Advisory
http://packetstormsecurity.com/files/127573/Linux-Kernel-ptrace-sysret-Local-Privilege-Escalation.html
  • Exploit
  • Third Party Advisory
  • VDB Entry
34134
  • Exploit
  • Third Party Advisory
  • VDB Entry
60393
  • Third Party Advisory
108754
  • Broken Link
60220
  • Third Party Advisory
60380
  • Third Party Advisory
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9cd18de4db3c9ffa7e17b0dc0ca99ed5aa4d43a
  • Broken Link
  • Third Party Advisory
    1. Configuration 1

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.15
      End excliding
      3.15.4

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.13
      End excliding
      3.14.11

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.11
      End excliding
      3.12.25

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.5
      End excliding
      3.10.47

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      3.3
      End excliding
      3.4.97

      cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
      Start including
      2.6.17
      End excliding
      3.2.61

      Configuration 2

      cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

      Configuration 3

      cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*