Total vulnerabilities in the database
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain privileges, or cause a denial of service (double fault), via a crafted application that makes ptrace and fork system calls.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | 7.0 | 7.0.x |
canonical / ubuntu_linux | 13.10 | 13.10.x |
canonical / ubuntu_linux | 12.04 | 12.04.x |
canonical / ubuntu_linux | 14.04 | 14.04.x |
canonical / ubuntu_linux | 10.04 | 10.04.x |
linux / linux_kernel | 3.15 | 3.15.4 |
linux / linux_kernel | 3.13 | 3.14.11 |
linux / linux_kernel | 3.11 | 3.12.25 |
linux / linux_kernel | 3.5 | 3.10.47 |
linux / linux_kernel | 3.3 | 3.4.97 |
linux / linux_kernel | 2.6.17 | 3.2.61 |