Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 505696 (CVE-2014-0038) - Kernel: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
Summary: Kernel: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
Status: RESOLVED FIXED
Alias: CVE-2014-0038
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Kernel Security
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-03-25 13:23 UTC by Agostino Sarubbo
Modified: 2022-03-25 21:47 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-03-25 13:23:32 UTC
CVE-2014-0038 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0038):

The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is 
enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer 
parameter.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2014-08-10 22:05:26 UTC
CVE-2014-0038 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0038):
  The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before
  3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain
  privileges via a recvmmsg system call with a crafted timeout pointer
  parameter.