Home page logo

oss-sec logo oss-sec mailing list archives

Linux kernel futex local privilege escalation (CVE-2014-3153)
From: Solar Designer <solar () openwall com>
Date: Thu, 5 Jun 2014 18:45:45 +0400


This was handled via linux-distros, hence the mandatory oss-security
posting.  The issue was made public earlier today, and is included in
this Debian advisory:



    Pinkie Pie discovered an issue in the futex subsystem that allows a
    local user to gain ring 0 control via the futex syscall. An
    unprivileged user could use this flaw to crash the kernel (resulting
    in denial of service) or for privilege escalation.

I've attached patches by Thomas Gleixner (four e-mails, in mbox format),
as well as back-ports of those by John Johansen of Canonical, who wrote:

For anyone who is interested I've attached back ports of the patches to

  3.13 - minor conflicts in patch 4. It has applied cleanly back to 3.2
  2.6.32 - conflict is in patches 3, and 4


Attachment: futex.mbox

Attachment: patches-2.6.32.tgz

Attachment: patches-3.13.tgz

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]