Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:CB87545A2D6E3B6DCF68CD117331BD4E
HistoryAug 18, 2014 - 12:00 a.m.

CVE-2014-3153 Futex requeue exploit | Cloud Foundry

2014-08-1800:00:00
Cloud Foundry
www.cloudfoundry.org
27

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

47.0%

CVE-2014-3153 Futex requeue exploit

Important to Low

Vendor

Canonical Ubuntu

Versions Affected

  • Linux kernel through 3.14.5

Description

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. An unprivileged user could use this flaw to crash the kernel (resulting in denial of service) or for privilege escalation.

Affected Products and Versions

_Severity is important unless otherwise noted.
_

  • Cloud Foundry final releases prior to v177

Mitigation

Users of affected versions should apply the following mitigation:

  • Cloud Foundry Runtime Deployments running Release v176 or earlier upgrade to v177 or higher. As of v177, Cloud Foundry is integrated with BOSH stemcell 2671, based on Ubuntu 14.04, which resolves this vulnerability.

Credit

Many thanks to Pinkie Pie, the anonymous researcher who first discovered and reported this issue.

References

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

47.0%