Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 456004 - Kernel : x86/msr: /dev/cpu/*/msr local privilege escalation (CVE-2013-0268)
Summary: Kernel : x86/msr: /dev/cpu/*/msr local privilege escalation (CVE-2013-0268)
Status: RESOLVED OBSOLETE
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL: https://bugzilla.redhat.com/show_bug....
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2013-02-07 12:36 UTC by Agostino Sarubbo
Modified: 2018-04-04 18:28 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-02-07 12:36:22 UTC
From $URL :

Access to /dev/cpu/*/msr was protected only using filesystem checks. A local uid 0 (root) user with 
all capabilities dropped could use this flaw to execute arbitrary code in kernel mode.

Upstream commit:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git;a=commitdiff;h=c903f0456bc69176912dee6dd25c6a66ee1aed00

References:
http://grsecurity.net/~spender/msr32.c
Comment 1 Aaron Bauman (RETIRED) gentoo-dev 2018-04-04 18:28:31 UTC
There are no longer any 2.x kernels available in the repository with the exception of sys-kernel/xbox-sources which is unsupported by security.