High severity7.8NVD Advisory· Published Apr 4, 2017· Updated May 13, 2026
CVE-2014-9922
CVE-2014-9922
Description
The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.
Affected products
34- osv-coords32 versionspkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/cluster-network&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/drbd&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/drbd-kmp&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/gfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2011%20SP4pkg:rpm/suse/ocfs2&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4
< 1.4-2.32.2.14+ 31 more
- (no CPE)range: < 1.4-2.32.2.14
- (no CPE)range: < 1.4-2.32.2.14
- (no CPE)range: < 8.4.4-0.27.2.1
- (no CPE)range: < 8.4.4-0.27.2.13
- (no CPE)range: < 8.4.4-0.27.2.13
- (no CPE)range: < 2-0.24.2.14
- (no CPE)range: < 2-0.24.2.14
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.2
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101.rt130-69.5.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 3.0.101-108.7.1
- (no CPE)range: < 1.6-0.28.3.4
- (no CPE)range: < 1.6-0.28.3.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchThird Party Advisory
- source.android.com/security/bulletin/2017-04-01.htmlnvdPatchThird Party Advisory
- github.com/torvalds/linux/commit/69c433ed2ecd2d3264efd7afec4439524b319121nvdIssue TrackingPatchThird Party Advisory
- www.securityfocus.com/bid/97354nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1038201nvd
News mentions
0No linked articles in our index yet.