A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.
ref.:
https://access.redhat.com/security/cve/CVE-2014-9322
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9322
for OpenVZ/Virtuozzo -
http://kb.sp.parallels.com/en/123961
http://lists.openvz.org/pipermail/announce/2014-December/000548.html
Last edited: