Your submission was sent successfully! Close

CVE-2014-4508

Published: 23 June 2014

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

From the Ubuntu security team

Toralf Förster reported an error in the Linux kernels syscall auditing on 32 bit x86 platforms. A local user could exploit this flaw to cause a denial of service (OOPS and system crash).

Priority

Low

Status

Package Release Status
linux
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
Patches:
Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by 554086d85e71f30abe46fc014fea31929a7c6a8a
linux-armadaxp
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-aws
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-ec2
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-flo
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(x86 specific)
linux-fsl-imx51
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-gke
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-goldfish
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-grouper
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(x86 specific)
linux-hwe
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-hwe-edge
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-linaro-omap
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-linaro-shared
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-linaro-vexpress
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-lts-quantal
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-lts-raring
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-lts-saucy
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
This package is not directly supported by the Ubuntu Security Team
linux-lts-trusty
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-lts-utopic
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-lts-vivid
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-lts-wily
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-lts-xenial
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-maguro
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(x86 specific)
linux-mako
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(x86 specific)
linux-manta
Launchpad, Ubuntu, Debian
Upstream Not vulnerable
(x86 specific)
linux-mvl-dove
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-qcm-msm
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-raspi2
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-snapdragon
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)
linux-ti-omap4
Launchpad, Ubuntu, Debian
Upstream
Released (3.16~rc3)

Notes

AuthorNote
jdstrand
android kernels (goldfish, grouper, maguro, mako and manta) are not
supported on the Ubuntu Touch 13.10 preview kernels
android kernels (flo, goldfish, grouper, maguro, mako and manta) are
not supported on the Ubuntu Touch 14.04 preview kernels
linux-lts-saucy no longer receives official support
linux-lts-quantal no longer receives official support

References

Bugs