Vulnerability Name: | CVE-2014-7825 (CCN-98557) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2014-11-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2014-11-07 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2023-02-13 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism via a crafted application. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C) 5.3 Medium (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.0 Low (REDHAT Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-7825 Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Linux Kernel GIT Repository tracing/syscalls: Ignore numbers outside NR_syscalls' range Source: CCN Type: RHSA-2014-1943 Moderate: kernel-rt security, bug fix, and enhancement update Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: RHSA-2015-0290 Important: kernel security, bug fix, and enhancement update Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory secalert@redhat.com Source: CCN Type: IBM Security Bulletin 1021943 PowerKVM Kernel Vulnerabilities - Multiple CVEs Source: secalert@redhat.com Type: Mailing List, Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: BID-70972 Linux Kernel 'trace_syscalls.c' Multiple Local Denial of Service Vulnerabilities Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 1161565 (CVE-2014-7825, CVE-2014-7826) CVE-2014-7825 CVE-2014-7826 kernel: insufficient syscall number validation in perf and ftrace subsystems Source: secalert@redhat.com Type: Issue Tracking, Patch, Third Party Advisory secalert@redhat.com Source: secalert@redhat.com Type: Third Party Advisory, VDB Entry secalert@redhat.com Source: XF Type: UNKNOWN linux-kernel-cve20147825-dos(98557) Source: secalert@redhat.com Type: Exploit, Patch, Third Party Advisory secalert@redhat.com Source: CCN Type: WhiteSource Vulnerability Database CVE-2014-7825 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |