CVE-2014-0038

Priority
Description
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before
3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain
privileges via a recvmmsg system call with a crafted timeout pointer
parameter.
Ubuntu-Description
Pageexec reported a bug in the Linux kernel's recvmmsg syscall when called
from code using the x32 ABI. An unprivileged local user could exploit this
flaw to cause a denial of service (system crash) or gain administrator
privileges.
Notes
jjx32 abi enabled kernels only: CONFIG_X86_X32 && ld can build x32
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.14~rc1)
Patches:
Break-fix:ee4fa23c4bfcc635d077a9633d405610de45bc70
Package
Upstream:not-affected (x32 only)
This package is not directly supported by the Ubuntu Security Team
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:released (3.14~rc1)
Patches:
Package
Upstream:released (3.14~rc1)
Package
Upstream:released (3.14~rc1)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:not-affected (x32 only)
Package
Upstream:released (3.14~rc1)
Package
Upstream:not-affected (x32 only)
More Information

Updated: 2020-09-10 02:53:40 UTC (commit 81a23a978c4436cd99e1d040e9e73e9146876281)