CVE-2014-0038
Publication date 30 January 2014
Last updated 24 July 2024
Ubuntu priority
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
From the Ubuntu Security Team
Pageexec reported a bug in the Linux kernel's recvmmsg syscall when called from code using the x32 ABI. An unprivileged local user could exploit this flaw to cause a denial of service (system crash) or gain administrator privileges.
Status
Package | Ubuntu Release | Status |
---|---|---|
linux | ||
linux-armadaxp | ||
linux-ec2 | ||
linux-fsl-imx51 | ||
linux-goldfish | ||
linux-grouper | ||
linux-linaro-omap | ||
linux-linaro-shared | ||
linux-linaro-vexpress | ||
linux-lts-quantal | ||
linux-lts-raring | ||
linux-lts-saucy | ||
linux-maguro | ||
linux-mako | ||
linux-manta | ||
linux-mvl-dove | ||
linux-qcm-msm | ||
linux-ti-omap4 | ||
Notes
References
Related Ubuntu Security Notices (USN)
- USN-2095-1
- Linux kernel (Saucy HWE) vulnerability
- 31 January 2014
- USN-2096-1
- Linux kernel vulnerability
- 31 January 2014
- USN-2094-1
- Linux kernel (Raring HWE) vulnerability
- 31 January 2014