|
Message-ID: <20140605144545.GA23223@openwall.com> Date: Thu, 5 Jun 2014 18:45:45 +0400 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Linux kernel futex local privilege escalation (CVE-2014-3153) Hi, This was handled via linux-distros, hence the mandatory oss-security posting. The issue was made public earlier today, and is included in this Debian advisory: https://lists.debian.org/debian-security-announce/2014/msg00130.html --- CVE-2014-3153 Pinkie Pie discovered an issue in the futex subsystem that allows a local user to gain ring 0 control via the futex syscall. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation. --- I've attached patches by Thomas Gleixner (four e-mails, in mbox format), as well as back-ports of those by John Johansen of Canonical, who wrote: --- For anyone who is interested I've attached back ports of the patches to 3.13 - minor conflicts in patch 4. It has applied cleanly back to 3.2 and 2.6.32 - conflict is in patches 3, and 4 --- Alexander Download attachment "futex.mbox" of type "application/mbox" (17348 bytes) Download attachment "patches-2.6.32.tgz" of type "application/octet-stream" (5098 bytes) Download attachment "patches-3.13.tgz" of type "application/octet-stream" (5120 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.