CVE-2014-0038

Linux Kernel recvmmsg Privilege Escalation

Title source: metasploit

Description

The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.

Exploits (8)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocallinux
https://www.exploit-db.com/exploits/40503
exploitdb WORKING POC VERIFIED
by rebel · clocallinux_x86-64
https://www.exploit-db.com/exploits/31347
exploitdb WORKING POC VERIFIED
by saelo · clocallinux
https://www.exploit-db.com/exploits/31346
exploitdb WORKING POC
by Kees Cook · cdoslinux
https://www.exploit-db.com/exploits/31305
nomisec WORKING POC 199 stars
by saelo · poc
https://github.com/saelo/cve-2014-0038
github WORKING POC 31 stars
by OpenSISE · cpoc
https://github.com/OpenSISE/CVE_PoC_Collect/tree/master/EoP/linux/CVE-2014-0038
nomisec WRITEUP
by kiruthikan99 · poc
https://github.com/kiruthikan99/IT19115276
metasploit WORKING POC GOOD
by h00die <[email protected]>, rebel · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/recvmmsg_priv_esc.rb

References (19)

Scores

EPSS 0.5152
EPSS Percentile 97.9%

Details

CWE
CWE-20
Status published
Products (2)
linux/linux_kernel 3.4 - 3.4.79
opensuse/opensuse 12.3
Published Feb 06, 2014
Tracked Since Feb 18, 2026