Public Date:
1115927: CVE-2014-4699 kernel: x86_64: ptrace: sysret to non-canonical address
It was found that the Linux kernel's ptrace subsystem allowed a traced process' instruction pointer to be set to a non-canonical memory address without forcing the non-sysret code path when returning to user space. A local, unprivileged user could use this flaw to crash the system or, potentially, escalate their privileges on the system. Note: The CVE-2014-4699 issue only affected systems using an Intel CPU.

Find out more about CVE-2014-4699 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.

CVSS v2 metrics

Base Score 6.9
Base Metrics AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Advanced Update Support 6.2 (kernel) RHSA-2014:0949 2014-07-28
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2014:0913 2014-07-22
Red Hat Enterprise Linux Extended Update Support 6.4 (kernel) RHSA-2014:0925 2014-07-23
Red Hat Enterprise Linux 7 (kernel) RHSA-2014:0923 2014-07-23
Red Hat Enterprise Linux 6 (kernel) RHSA-2014:0924 2014-07-23

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 kernel Not affected


Red Hat would like to thank Andy Lutomirski for reporting this issue.
Last Modified