Description
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-7692 | kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application. |
Ubuntu USN |
USN-2443-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2444-1 | Linux kernel (OMAP4) vulnerabilities |
Ubuntu USN |
USN-2445-1 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-2446-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2447-1 | Linux kernel (Utopic HWE) vulnerabilities |
Ubuntu USN |
USN-2448-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T13:03:27.452Z
Reserved: 2014-10-03T00:00:00.000Z
Link: CVE-2014-7826
No data.
Status : Modified
Published: 2014-11-10T11:55:08.173
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-7826
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN