CVE-2014-3917
Published: 5 June 2014
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
From the Ubuntu security team
An flaw was discovered in the Linux kernel's audit subsystem when auditing certain syscalls. A local attacker could exploit this flaw to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS).
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
Patches: Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 |
||
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(3.16~rc1)
|
Notes
Author | Note |
---|---|
jdstrand | android kernels (goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 13.10 preview kernels android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.04 preview kernels |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917
- http://article.gmane.org/gmane.linux.kernel/1713179
- https://ubuntu.com/security/notices/USN-2281-1
- https://ubuntu.com/security/notices/USN-2282-1
- https://ubuntu.com/security/notices/USN-2285-1
- https://ubuntu.com/security/notices/USN-2286-1
- https://ubuntu.com/security/notices/USN-2287-1
- https://ubuntu.com/security/notices/USN-2289-1
- https://ubuntu.com/security/notices/USN-2314-1
- https://ubuntu.com/security/notices/USN-2313-1
- https://ubuntu.com/security/notices/USN-2334-1
- https://ubuntu.com/security/notices/USN-2335-1
- NVD
- Launchpad
- Debian