Vulnerability Name: | CVE-2014-1438 (CCN-90031) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2013-12-29 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2013-12-29 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2014-03-16 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.7 Medium (CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C) 3.5 Low (Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
3.5 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:M/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-264 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-1438 Source: CONFIRM Type: Exploit, Patch http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=26bef1318adc1b3a530ecc807ef99346db2aa8b0 Source: FEDORA Type: UNKNOWN FEDORA-2014-1072 Source: FEDORA Type: UNKNOWN FEDORA-2014-1062 Source: CCN Type: RHSA-2014-0439 Important: kernel-rt security, bug fix, and enhancement update Source: CCN Type: SA56406 Linux Kernel "restore_fpu_checking()" Denial of Service Vulnerability Source: CCN Type: SA56596 Linux Kernel IRC DCC Memory Disclosure and "restore_fpu_checking()" Denial of Service Vulnerabilities Source: MISC Type: UNKNOWN http://www.halfdog.net/Security/2013/Vm86SyscallTaskSwitchKernelPanic/ Source: CONFIRM Type: UNKNOWN http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.8 Source: MANDRIVA Type: UNKNOWN MDVSA-2014:038 Source: MLIST Type: UNKNOWN [oss-security] 20140114 Re: Linux kernel: missing CPU-state sanitation during task-switch causes DOS / privilege escalation Source: BID Type: UNKNOWN 64781 Source: CCN Type: BID-64781 Linux Kernel 'fpu-internal.h' Local Denial of Service Vulnerability Source: SECTRACK Type: UNKNOWN 1029592 Source: UBUNTU Type: UNKNOWN USN-2113-1 Source: UBUNTU Type: UNKNOWN USN-2117-1 Source: UBUNTU Type: UNKNOWN USN-2133-1 Source: UBUNTU Type: UNKNOWN USN-2134-1 Source: UBUNTU Type: UNKNOWN USN-2135-1 Source: UBUNTU Type: UNKNOWN USN-2136-1 Source: UBUNTU Type: UNKNOWN USN-2138-1 Source: UBUNTU Type: UNKNOWN USN-2139-1 Source: UBUNTU Type: UNKNOWN USN-2141-1 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=1052914 Source: XF Type: UNKNOWN vm86-taskswitch-dos(90031) Source: CCN Type: Linux Kernel GIT Repository netfilter: nf_nat: fix access to uninitialized buffer in IRC NAT helper Source: CONFIRM Type: UNKNOWN https://github.com/torvalds/linux/commit/26bef1318adc1b3a530ecc807ef99346db2aa8b0 Source: MLIST Type: UNKNOWN [linux-kernel] 20140110 Re: Sanitize CPU-state when switching tasks (was sanitize CPU-state when switching from virtual-8086 mode to other task) Source: CCN Type: Packet Storm Security [12-29-2013] VM86 Syscall Kernel Panic Source: CCN Type: Packet Storm Security [01-07-2014] vm86 Syscall Linux Root Privilege Escalation Source: CCN Type: The Linux Kernel Web site Linux 3.10.27 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |