{
  "threat_severity" : "Important",
  "public_date" : "2014-12-15T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility",
    "id" : "1172806",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1172806"
  },
  "cvss" : {
    "cvss_base_score" : "7.2",
    "cvss_scoring_vector" : "AV:L/AC:L/Au:N/C:C/I:C/A:C",
    "status" : "verified"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.4",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-841",
  "details" : [ "arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.", "A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system." ],
  "statement" : "This issue does affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 4, 5, 6, and 7, and Red Hat Enterprise MRG 2. Future Linux\nkernel updates for the respective releases will address this issue.",
  "acknowledgement" : "Red Hat would like to thank Andy Lutomirski for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 4 Extended Lifecycle Support",
    "release_date" : "2015-01-05T00:00:00Z",
    "advisory" : "RHSA-2015:0009",
    "cpe" : "cpe:/o:redhat:rhel_els:4",
    "package" : "kernel-0:2.6.9-106.EL"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2014-12-17T00:00:00Z",
    "advisory" : "RHSA-2014:2008",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kernel-0:2.6.18-400.1.1.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.6 Long Life",
    "release_date" : "2014-12-22T00:00:00Z",
    "advisory" : "RHSA-2014:2031",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:5.6",
    "package" : "kernel-0:2.6.18-238.54.1.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.9 Extended Update Support",
    "release_date" : "2014-12-22T00:00:00Z",
    "advisory" : "RHSA-2014:2029",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.9",
    "package" : "kernel-0:2.6.18-348.29.1.el5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2014-12-16T00:00:00Z",
    "advisory" : "RHSA-2014:1997",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-504.3.3.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.2 Advanced Update Support",
    "release_date" : "2014-12-22T00:00:00Z",
    "advisory" : "RHSA-2014:2028",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:6.2",
    "package" : "kernel-0:2.6.32-220.57.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.4 Extended Update Support",
    "release_date" : "2014-12-22T00:00:00Z",
    "advisory" : "RHSA-2014:2030",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.4",
    "package" : "kernel-0:2.6.32-358.51.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.5 Extended Update Support",
    "release_date" : "2014-12-17T00:00:00Z",
    "advisory" : "RHSA-2014:2009",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.5",
    "package" : "kernel-0:2.6.32-431.40.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2014-12-18T00:00:00Z",
    "advisory" : "RHSA-2014:2010",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "kernel-0:3.10.0-123.13.2.el7"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2014-12-16T00:00:00Z",
    "advisory" : "RHSA-2014:1998",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-0:3.10.58-rt62.60.el6rt"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux Extended Update Support 5.6",
    "fix_state" : "Affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2014-9322\nhttps://nvd.nist.gov/vuln/detail/CVE-2014-9322" ],
  "name" : "CVE-2014-9322",
  "csaw" : false
}