FS#40715 - [linux] Linux kernel futex local privilege escalation (CVE-2014-3153)
Attached to Project:
Arch Linux
Opened by Daniel Micay (thestinger) - Thursday, 05 June 2014, 17:47 GMT
Last edited by Tobias Powalowski (tpowa) - Sunday, 08 June 2014, 19:21 GMT
Opened by Daniel Micay (thestinger) - Thursday, 05 June 2014, 17:47 GMT
Last edited by Tobias Powalowski (tpowa) - Sunday, 08 June 2014, 19:21 GMT
|
Details
There is a serious privilege escalation issue in the
kernel:
http://seclists.org/oss-sec/2014/q2/467 It's a bit worse than the usual ones, because `futex` is a very common system call permitted inside sandboxes like the ones used by Chromium, Tor and OpenSSH. |
This task depends upon
Closed by Tobias Powalowski (tpowa)
Sunday, 08 June 2014, 19:21 GMT
Reason for closing: Fixed
Additional comments about closing: 3.14.6
Sunday, 08 June 2014, 19:21 GMT
Reason for closing: Fixed
Additional comments about closing: 3.14.6
I'll test them later with my AUR packages (linux-lts312/-ck/312-ck).
NOTE: From what I understand, 0003-futex-2.6.32.patch is a correction of 0003-futex for something.
0002-futex-validate-atomic-ac... (1.6 KiB)
0003-futex-cleanup-owner-tid-... (2.8 KiB)
0004-futex.patch (11.3 KiB)
0003-futex-2.6.32.patch (3.1 KiB)