SB2016080609 - Security restrictions bypass in Linux kernel include asm
Published: August 6, 2016
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Security restrictions bypass (CVE-ID: CVE-2014-9870)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to security restrictions bypass error within the arm_syscall() and get_tp_trap() functions in arch/arm/kernel/traps.c, within the arch_ptrace() function in arch/arm/kernel/ptrace.c, within the copy_thread() function in arch/arm/kernel/process.c, within the entry() function in arch/arm/kernel/entry-armv.s. A local non-authenticated attacker can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a4780adeefd042482f624f5e0d577bf9cdcbb760
- http://source.android.com/security/bulletin/2016-08-01.html
- http://www.securityfocus.com/bid/92219
- https://github.com/torvalds/linux/commit/a4780adeefd042482f624f5e0d577bf9cdcbb760
- https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=4f57652fcd2dce7741f1ac6dc0417e2f265cd1de