** Description changed:

- no SIGKILL after prctl(PR_SET_SECCOMP, 1, ...) on MIPS
+ arch/mips/include/asm/thread_info.h in the Linux kernel before 3.14.8 on
+ the MIPS platform does not configure _TIF_SECCOMP checks on the fast
+ system-call path, which allows local users to bypass intended
+ PR_SET_SECCOMP restrictions by executing a crafted application without
+ invoking a trace or audit subsystem.
+ 
+ Break-Fix: - 137f7df8cead00688524c82360930845396b8a21

** Changed in: linux (Ubuntu)
       Status: New => Invalid

** Changed in: linux (Ubuntu Trusty)
       Status: New => Invalid

** Changed in: linux (Ubuntu Utopic)
       Status: New => Invalid

** Changed in: linux-lts-backport-maverick (Ubuntu)
       Status: New => Invalid

** Changed in: linux-lts-backport-natty (Ubuntu)
       Status: New => Invalid

** Changed in: linux-lts-saucy (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-lts-raring (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-lts-quantal (Ubuntu Precise)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1333614

Title:
  CVE-2014-4157

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1333614/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to