CVE-2014-7825 PUBLISHED

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR protection mechanism via a crafted application.

EPSS 0.04% · 12.5th percentile

Risk Scores

EPSS Score
0.04%
12.5th percentile

Affected Products

VendorProductVersions
Ubuntu:24.04:LTSlinux-azure-6.116.11.0-1017.17~24.04.1, 6.11.0-1015.15~24.04.1, 6.11.0-1018.18~24.04.1
Ubuntu:22.04:LTSlinux-realtime0, 5.15.0-1032.35
Ubuntu:Pro:20.04:LTSlinux-azure-fde-5.155.15.0-1067.76~20.04.1.1, 5.15.0-1103.112~20.04.1.1, 5.15.0-1102.111~20.04.1.1
Ubuntu:14.04:LTSlinux-lts-utopic0, 3.16.0-25.33~14.04.2
Ubuntu:24.04:LTSlinux-gcp-6.116.11.0-1017.17~24.04.1, 6.11.0-1016.16~24.04.1, 6.11.0-1015.15~24.04.1
Ubuntu:14.04:LTSlinux3.13.0-16.36, 3.13.0-15.35, 3.13.0-14.34
Ubuntu:18.04:LTSlinux-hwe-edge0, 5.0.0-15.16~18.04.1, 5.0.0-16.17~18.04.1
Ubuntu:18.04:LTSlinux-gcp4.15.0-1025.26, 0, 4.15.0-1001.1
Ubuntu:24.04:LTSlinux-riscv6.8.0-60.63.1, 6.8.0-52.53.1, 6.8.0-53.55.1
Ubuntu:20.04:LTSlinux-raspi25.3.0-1015.17, 5.3.0-1014.16, 5.3.0-1007.8
Ubuntu:18.04:LTSlinux-hwe4.18.0-25.26~18.04.1, 4.18.0-24.25~18.04.1, 4.18.0-22.23~18.04.1
Ubuntu:20.04:LTSlinux-gke5.4.0-1101.108, 0, 5.4.0-1033.35
Ubuntu:20.04:LTSlinux-riscv5.4.0-40.45, 5.4.0-39.44, 5.4.0-37.42
Ubuntu:22.04:LTSlinux-riscv5.15.0-1020.23, 5.15.0-1019.22, 5.15.0-1018.21
Ubuntu:20.04:LTSlinux-gkeop5.4.0-1057.61, 5.4.0-1060.64, 5.4.0-1061.65
Ubuntu:24.04:LTSlinux-realtime6.8.1-1015.16, 0
Ubuntu:24.04:LTSlinux-raspi-realtime0, 6.8.0-2019.20
Ubuntu:24.04:LTSlinux-lowlatency-hwe-6.116.11.0-1014.15~24.04.1, 6.11.0-1013.14~24.04.1, 6.11.0-1012.13~24.04.1
Ubuntu:20.04:LTSlinux-azure-fde5.4.0-1067.70+cvm1.1, 5.4.0-1072.75+cvm1.1, 5.4.0-1073.76+cvm1.1
Ubuntu:18.04:LTSlinux-azure0, 5.0.0-1036.38, 5.0.0-1032.34

…and 2 more

Timeline

References

Open in Interactive Console →