CVE-2014-9322

HIGH

Linux kernel <3.17.5 - Privilege Escalation

Title source: llm

Description

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

Exploits (3)

exploitdb WORKING POC
by Ren Kimura · locallinux
https://www.exploit-db.com/exploits/44205
exploitdb WORKING POC
by Emeric Nasi · cdoslinux_x86-64
https://www.exploit-db.com/exploits/36266
nomisec WORKING POC 8 stars
by RKX1209 · poc
https://github.com/RKX1209/CVE-2014-9322

References (22)

... and 2 more

Scores

CVSS v3 7.8
EPSS 0.0523
EPSS Percentile 90.0%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-269
Status published
Products (7)
canonical/ubuntu_linux 10.04
google/android 6.0
google/android 6.0.1
linux/linux_kernel < 3.2.65
opensuse/evergreen 11.4
redhat/enterprise_linux_eus 5.6
suse/suse_linux_enterprise_server 10 sp4
Published Dec 17, 2014
Tracked Since Feb 18, 2026