Home page logo

oss-sec logo oss-sec mailing list archives

Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
From: Kees Cook <kees () ubuntu com>
Date: Thu, 5 Jun 2014 08:49:50 -0700

On Thu, Jun 05, 2014 at 06:45:45PM +0400, Solar Designer wrote:
This was handled via linux-distros, hence the mandatory oss-security
posting.  The issue was made public earlier today, and is included in
this Debian advisory:



    Pinkie Pie discovered an issue in the futex subsystem that allows a
    local user to gain ring 0 control via the futex syscall. An
    unprivileged user could use this flaw to crash the kernel (resulting
    in denial of service) or for privilege escalation.

Specifically, the futex syscall can leave a queued kernel waiter hanging
on the stack. By manipulating the stack with further syscalls, the waiter
structure can be altered. When later woken up, the altered waiter can
result in arbitrary code execution in ring 0.

This flaw is especially urgent to fix because futex tends to be
available within most Linux sandboxes (because it is used as a glibc
pthread primitive).


Kees Cook

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]