{
  "name": "CVE-2014-9322",
  "CVE": [
    [
      "CVE-2014-9322",
      "Bulletin-CVE-2014-9322"
    ]
  ],
  "Coordinated_disclosure": "unknown",
  "Categories": [
    "Elevation of Privilege Vulnerability in Kernel"
  ],
  "Details": [
    [
      "arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.",
      "NIST-CVE-2014-9322"
    ]
  ],
  "Discovered_on": [],
  "Discovered_by": [],
  "Submission": [
    {
      "by": "dcc52",
      "on": "2019-07-29"
    }
  ],
  "Reported_on": [
    [
      "2016-04-02",
      "Bulletin-CVE-2014-9322"
    ]
  ],
  "Fixed_on": [
    [
      "2014-12-04",
      "11"
    ]
  ],
  "Fix_released_on": [],
  "Affected_versions": [
    [
      "6.0, 6.0.1",
      "Bulletin-CVE-2014-9322"
    ]
  ],
  "Affected_devices": [],
  "Affected_versions_regexp": [
    "(6\\.0\\.[0-9])|(6\\.0\\.1)"
  ],
  "Affected_manufacturers": [
    [
      "all",
      "Bulletin-CVE-2014-9322"
    ]
  ],
  "Fixed_versions": [
    [
      "6.0, 6.0.1",
      "Bulletin-CVE-2014-9322"
    ]
  ],
  "Fixed_versions_regexp": [
    "(6\\.0\\.[0-9])|(6\\.0\\.1)"
  ],
  "references": {
    "ANDROID-26927260": {
      "url": "https://android.googlesource.com/kernel/common/+/c22e479e335628ce8766cfbf06e2ba17e8f9a1bb"
    },
    "2": {
      "url": "https://android.googlesource.com/kernel/common/+/1b627d4e5e61e89b840f77abb3ca6711ad6ffbeb"
    },
    "3": {
      "url": "https://android.googlesource.com/kernel/common/+/4c941665c7368a34b146929b31949555e680a4ee"
    },
    "4": {
      "url": "https://android.googlesource.com/kernel/common/+/758f0dac9104b46016af98304656a0268ac3e105"
    },
    "5": {
      "url": "https://android.googlesource.com/kernel/common/+/44d057a37868a60bc2eb6e7d1dcea701f234d56a"
    },
    "6": {
      "url": "https://android.googlesource.com/kernel/common/+/b9b9f908c8ae82b73b9d75181982028b6bc06c2b"
    },
    "7": {
      "url": "https://android.googlesource.com/kernel/common/+/e068734f9e7344997a61022629b92d142a985ab3"
    },
    "8": {
      "url": "https://android.googlesource.com/kernel/common/+/fdc6c1052bc7d89a5826904fbb4318677e8442ce"
    },
    "9": {
      "url": "https://android.googlesource.com/kernel/common/+/211d59c0034ec9d88690c750ccd6da27f6952dc5"
    },
    "10": {
      "url": "https://android.googlesource.com/kernel/common/+/c9e31d5a4747e9967ace6d05896c78516c4c0850"
    },
    "11": {
      "url": "https://android.googlesource.com/kernel/common/+/e01834bfbafd25fd392bf10014451c4e5f34f829"
    },
    "NIST-CVE-2014-9322": {
      "url": "https://nvd.nist.gov/vuln/data-feeds"
    },
    "Bulletin-CVE-2014-9322": {
      "url": "https://source.android.com/security/bulletin/2016-04-02.html"
    }
  },
  "Surface": [
    "local",
    "app"
  ],
  "Vector": [
    "memory-corruption"
  ],
  "Target": [
    "kernel"
  ],
  "Channel": [
    "app-execution"
  ],
  "Condition": [
    "affected-app-installed"
  ],
  "Privilege": [
    "kernel"
  ],
  "CWE": [
    [
      "CWE-264",
      "NIST-CVE-2014-9322"
    ]
  ]
}