LOW · 3.3

CVE-2014-3917

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel me...

Vulnerability Description

kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.

CVSS Score

3.3

LOW

AV:L/AC:M/Au:N/C:P/I:N/A:P
Confidentiality
PARTIAL
Integrity
NONE
Availability
PARTIAL

Affected Products

VendorProductVersions
SuseLinux Enterprise Desktop10.0
RedhatEnterprise Linux5
RedhatEnterprise Mrg2.0
LinuxLinux Kernel<= 3.14.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3917?

CVE-2014-3917 is a vulnerability with a CVSS score of 3.3 (LOW). kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel me...

How severe is CVE-2014-3917?

CVE-2014-3917 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3917?

Check the references section above for vendor advisories and patch information. Affected products include: Suse Linux Enterprise Desktop, Redhat Enterprise Linux, Redhat Enterprise Mrg, Linux Linux Kernel.