CVE-2014-9419

Impact:
Low
Public Date:
2014-12-08
CWE:
CWE-200
Bugzilla:
1177260: CVE-2014-9419 kernel: partial ASLR bypass through TLS base addresses leak
An information leak flaw was found in the way the Linux kernel changed certain segment registers and thread-local storage (TLS) during a context switch. A local, unprivileged user could use this flaw to leak the user space TLS base address of an arbitrary process.

Find out more about CVE-2014-9419 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.

This issue has been rated as having Low security impact and is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.

CVSS v2 metrics

Base Score 1.9
Base Metrics AV:L/AC:M/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux for Real Time for NFV (v. 7) (kernel-rt) RHSA-2015:2411 2015-11-19
Red Hat Enterprise Linux 6 (kernel) RHSA-2015:1081 2015-06-09
Red Hat Enterprise Linux 7 (kernel) RHSA-2015:2152 2015-11-19

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 kernel Will not fix
Red Hat Enterprise Linux 5 kernel Will not fix
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.
Last Modified