Local Users Can Exploit Linux Kernel Vulnerability in Auditing System
CVE-2014-3917
Currently unrated
Summary
The vulnerability occurs in the Linux kernel's auditing subsystem when CONFIG_AUDITSYSCALL is enabled. Local users can exploit this issue through manipulated syscall numbers, potentially leading to exposure of sensitive single-bit values from kernel memory or triggering a denial of service (OOPS). Adequate bounds checking is crucial to mitigate these risks and maintain system integrity.
References
Timeline
Vulnerability published
Vulnerability Reserved