3.3
CVSSv2

CVE-2014-3917

Published: 05/06/2014 Updated: 15/07/2021
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:P

Vulnerability Summary

kernel/auditsc.c in the Linux kernel up to and including 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

Vulnerable Product Search on Vulmon Subscribe to Product

suse linux enterprise desktop 10.0

redhat enterprise mrg 2.0

redhat enterprise linux 5

redhat enterprise linux 6.0

linux linux kernel 3.14

linux linux kernel 3.14.2

linux linux kernel 3.14.4

linux linux kernel

linux linux kernel 3.14.1

linux linux kernel 3.14.3

Vendor Advisories

Debian Bug report logs - #751417 linux-image-320-4-5kc-malta: no SIGKILL after prctl(PR_SET_SECCOMP, 1, ) on MIPS (CVE-2014-4157) Package: src:linux; Maintainer for src:linux is Debian Kernel Team <debian-kernel@listsdebianorg>; Reported by: Plamen Alexandrov <plamen@aomedacom> Date: Thu, 12 Jun 2014 16:21:01 ...
An out-of-bounds memory access flaw was found in the Linux kernel's system call auditing implementation On a system with existing audit rules defined, a local, unprivileged user could use this flaw to leak kernel memory to user space or, potentially, crash the system ...
Several security issues were fixed in the kernel ...
The system could be made to crash under certain conditions ...
The system could be made to crash under certain conditions ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...
Several security issues were fixed in the kernel ...