First published: Mon Jun 02 2014(Updated: )
A flaw was found in the way pi to pi futex requeueing was handled. A local unprivileged user can use this flaw to increase their privileges on the system.
Credit: chrome-cve-admin@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Kernel-devel | ||
Linux Kernel | <3.2.60 | |
Linux Kernel | >=3.3<3.4.92 | |
Linux Kernel | >=3.5<3.10.42 | |
Linux Kernel | >=3.11<3.12.22 | |
Linux Kernel | >=3.13<3.14.6 | |
Red Hat Enterprise Linux Server | =6.2 | |
openSUSE | =11.4 | |
SUSE Linux Enterprise Desktop | =11-sp3 | |
SUSE Linux Enterprise High Availability | =11-sp3 | |
SUSE Linux Enterprise Real Time Extension | =11-sp3 | |
SUSE Linux Enterprise Server | =11 | |
SUSE Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Server | =11-sp3 | |
SUSE Linux Enterprise Server | =11-sp3 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Oracle Linux | =5 | |
Oracle Linux | =6 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.128-1 6.12.20-1 6.12.21-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3153 is rated as a high-severity vulnerability due to its potential to allow local unprivileged users to escalate privileges.
To fix CVE-2014-3153, update the Linux kernel to a version that is not affected, such as any version after 3.14.6.
CVE-2014-3153 affects multiple versions of the Linux kernel, including versions up to 3.14.6 and certain distributions like Ubuntu 12.04 and Red Hat Enterprise Linux 6.2.
No, CVE-2014-3153 can only be exploited locally by an unprivileged user on the affected system.
Exploitation of CVE-2014-3153 allows an attacker to increase their privileges on the system, potentially leading to unauthorized access and control.