Vulnerability Description
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | < 3.2.60 |
| Redhat | Enterprise Linux Server Aus | 6.2 |
| Opensuse | Opensuse | 11.4 |
| Suse | Linux Enterprise Desktop | 11 |
| Suse | Linux Enterprise High Availability Extension | 11 |
| Suse | Linux Enterprise Real Time Extension | 11 |
| Suse | Linux Enterprise Server | 11 |
| Canonical | Ubuntu Linux | 12.04 |
| Oracle | Linux | 5 |
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=Broken Link
- http://linux.oracle.com/errata/ELSA-2014-0771.htmlThird Party Advisory
- http://linux.oracle.com/errata/ELSA-2014-3037.htmlThird Party Advisory
- http://linux.oracle.com/errata/ELSA-2014-3038.htmlThird Party Advisory
- http://linux.oracle.com/errata/ELSA-2014-3039.htmlThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.htmlMailing ListThird Party Advisory
- http://openwall.com/lists/oss-security/2014/06/05/24Mailing List
- http://openwall.com/lists/oss-security/2014/06/06/20Mailing List
- http://rhn.redhat.com/errata/RHSA-2014-0800.htmlThird Party Advisory
- http://secunia.com/advisories/58500Broken Link
FAQ
What is CVE-2014-3153?
CVE-2014-3153 is a vulnerability with a CVSS score of 7.8 (HIGH). The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted...
How severe is CVE-2014-3153?
CVE-2014-3153 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-3153?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Redhat Enterprise Linux Server Aus, Opensuse Opensuse, Suse Linux Enterprise Desktop, Suse Linux Enterprise High Availability Extension.