{"id":"CVE-2014-3917","details":"kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.","modified":"2026-01-27T04:12:45.991406Z","published":"2014-06-05T17:55:07Z","withdrawn":"2026-01-27T04:12:45.991406Z","related":["MGASA-2014-0265","MGASA-2014-0273","MGASA-2014-0330","MGASA-2014-0331","MGASA-2014-0332","MGASA-2014-0336","MGASA-2014-0337","MGASA-2015-0077","SUSE-RU-2015:0621-1","SUSE-SU-2015:0481-1","SUSE-SU-2015:0581-1","SUSE-SU-2015:0652-1","SUSE-SU-2015:0736-1","SUSE-SU-2015:1174-1","SUSE-SU-2015:1376-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1143.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-1281.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/59777"},{"type":"ADVISORY","url":"http://secunia.com/advisories/60011"},{"type":"ADVISORY","url":"http://secunia.com/advisories/60564"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2334-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2335-1"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102571"},{"type":"WEB","url":"http://article.gmane.org/gmane.linux.kernel/1713179"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2014/05/29/5"}],"schema_version":"1.7.3"}