Linux kernel built with the system-call auditing support(CONFIG_AUDITSYSCALL)
for 32-bit platforms is vulnerable to a crash caused by erroneous handling of
bad system call numerals. It occurs during syscall(2) calls, if system-call
auditing is enabled on the system.
An unprivileged user/process could use this flaw to crash the system kernel
resulting in DoS.
MITRE assigned CVE-2014-4508 to this issue:
Created kernel tracking bugs for this issue:
Affects: fedora-all [bug 1112073]
kernel-3.14.9-200.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
kernel-3.14.13-100.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 7, 8 and Red Hat Enterprise MRG 2.
This issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6. Future kernel updates for Red Hat Enterprise Linux 6 may address this issue.
This issue has been addressed in the following products:
Red Hat Enterprise Linux 6 Extended Lifecycle Support
Via RHSA-2021:0181 https://access.redhat.com/errata/RHSA-2021:0181
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):