** Summary changed:

- Fix-compat_sys_recvmmsg-on-x32-archs
+ CVE-2014-0038
** Description changed:

- The timeout pointer parameter is provided by userland (hence the __user
- annotation) but for x32 syscalls it's simply cast to a kernel pointer
- and is passed to __sys_recvmmsg which will eventually directly
- dereference it for both reading and writing. Other callers to
- __sys_recvmmsg properly copy from userland to the kernel first. The
- impact is a sort of arbitrary kernel write-where-what primitive by
- unprivileged users where the to-be-written area must contain valid
- timespec data initially (the first 64 bit long field must be positive
- and the second one must be < 1G).
+ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before
+ 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain
+ privileges via a recvmmsg system call with a crafted timeout pointer
+ parameter.
  
  Break-Fix: ee4fa23c4bfcc635d077a9633d405610de45bc70
  2def2ef2ae5f3990aabdbe8a755911902707d268

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1274349

Title:
  CVE-2014-0038

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1274349/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to