Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2014:038 | First vendor Publication | 2014-02-17 |
Vendor | Mandriva | Last vendor Modification | 2014-02-17 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.9 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 3.4 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities has been found and corrected in the Linux kernel: The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter (CVE-2014-0038). The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application (CVE-2014-1438). The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call (CVE-2014-1446). The updated packages provides a solution for these security issues. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2014:038 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
33 % | CWE-399 | Resource Management Errors |
33 % | CWE-264 | Permissions, Privileges, and Access Controls |
33 % | CWE-20 | Improper Input Validation |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:22089 | |||
Oval ID: | oval:org.mitre.oval:def:22089 | ||
Title: | USN-2094-1 -- linux-lts-raring vulnerability | ||
Description: | The system could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2094-1 CVE-2014-0038 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-raring |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22154 | |||
Oval ID: | oval:org.mitre.oval:def:22154 | ||
Title: | USN-2095-1 -- linux-lts-saucy vulnerability | ||
Description: | The system could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2095-1 CVE-2014-0038 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-saucy |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22524 | |||
Oval ID: | oval:org.mitre.oval:def:22524 | ||
Title: | USN-2096-1 -- linux vulnerability | ||
Description: | The system could be made to crash or run programs as an administrator. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2096-1 CVE-2014-0038 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23441 | |||
Oval ID: | oval:org.mitre.oval:def:23441 | ||
Title: | USN-2117-1 -- linux vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2117-1 CVE-2013-4563 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6376 CVE-2013-6382 CVE-2013-6432 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 | Version: | 5 |
Platform(s): | Ubuntu 13.10 | Product(s): | linux |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:24220 | |||
Oval ID: | oval:org.mitre.oval:def:24220 | ||
Title: | USN-2113-1 -- linux-lts-saucy vulnerabilities | ||
Description: | Several security issues were fixed in the kernel. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2113-1 CVE-2013-4563 CVE-2013-4579 CVE-2013-4587 CVE-2013-6367 CVE-2013-6368 CVE-2013-6376 CVE-2013-6382 CVE-2013-6432 CVE-2013-7263 CVE-2013-7264 CVE-2013-7265 CVE-2013-7266 CVE-2013-7267 CVE-2013-7268 CVE-2013-7269 CVE-2013-7270 CVE-2013-7271 CVE-2013-7281 CVE-2014-1438 CVE-2014-1446 | Version: | 5 |
Platform(s): | Ubuntu 12.04 | Product(s): | linux-lts-saucy |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2014-02-02 | linux 3.4+ local root (CONFIG_X86_X32=y) |
2014-02-02 | Linux 3.4+ Arbitrary write with CONFIG_X86_X32 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-12-11 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-3249-1.nasl - Type : ACT_GATHER_INFO |
2017-12-05 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2017-3210-1.nasl - Type : ACT_GATHER_INFO |
2017-04-03 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0057.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0832-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0536-1.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-0287-1.nasl - Type : ACT_GATHER_INFO |
2014-07-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0439.nasl - Type : ACT_GATHER_INFO |
2014-07-17 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_kernel-140709.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-376.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-375.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-114.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-113.nasl - Type : ACT_GATHER_INFO |
2014-06-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2234-1.nasl - Type : ACT_GATHER_INFO |
2014-06-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2233-1.nasl - Type : ACT_GATHER_INFO |
2014-05-20 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-3034.nasl - Type : ACT_GATHER_INFO |
2014-04-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2906.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2138-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2136-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2135-1.nasl - Type : ACT_GATHER_INFO |
2014-03-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2133-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2129-1.nasl - Type : ACT_GATHER_INFO |
2014-03-06 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2128-1.nasl - Type : ACT_GATHER_INFO |
2014-02-20 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-050-03.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2117-1.nasl - Type : ACT_GATHER_INFO |
2014-02-19 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2113-1.nasl - Type : ACT_GATHER_INFO |
2014-02-18 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-038.nasl - Type : ACT_GATHER_INFO |
2014-01-31 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2096-1.nasl - Type : ACT_GATHER_INFO |
2014-01-31 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2095-1.nasl - Type : ACT_GATHER_INFO |
2014-01-31 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2094-1.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-1062.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote Fedora host is missing a security update. File : fedora_2014-1072.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-19 13:21:59 |
|
2014-02-17 21:19:32 |
|