First published: Mon May 05 2014(Updated: )
A flaw was found in the way the Linux kernel's futex subsystem handled reference counting in case of futex requeue during futex_wait(). An unprivileged local user could use this flaw to crash the system or, potentially, escalate their privileges on the system by overputting reference counter on either inode or mm that backs up the memory area of the futex, leading to use-after-free. References: <a href="https://lkml.org/lkml/2010/9/16/99">https://lkml.org/lkml/2010/9/16/99</a> Upstream fix: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7ada876a8703f23befbb20a7465a702ee39b1704">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7ada876a8703f23befbb20a7465a702ee39b1704</a> Acknowledgements: The security impact of this issue was discovered by Mateusz Guzik of Red Hat.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=2.6.36.4 | |
Linux Linux kernel | =2.6.36 | |
Linux Linux kernel | =2.6.36-rc1 | |
Linux Linux kernel | =2.6.36-rc2 | |
Linux Linux kernel | =2.6.36-rc3 | |
Linux Linux kernel | =2.6.36-rc4 | |
Linux Linux kernel | =2.6.36-rc5 | |
Linux Linux kernel | =2.6.36-rc6 | |
Linux Linux kernel | =2.6.36-rc7 | |
Linux Linux kernel | =2.6.36-rc8 | |
Linux Linux kernel | =2.6.36.1 | |
Linux Linux kernel | =2.6.36.2 | |
Linux Linux kernel | =2.6.36.3 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.