CVE-2014-0205
Published Sep 28, 2014
Last updated 2 years ago
Overview
- Description
- The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.
- Source
- secalert@redhat.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C03086A2-8EEE-40E3-9A7F-A5303FBF0472", "versionEndIncluding": "2.6.36.4" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9F73DF14-B205-4345-8D2C-9F6F917C7998" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBE26099-6D2C-4FAF-B15C-CBF985D59171" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2C193FF-3723-4BE9-8787-DED7D455FA8F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F874FE6A-968D-47E1-900A-E154E41EDAF8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "14B7B8AE-CE83-4F0E-9138-6F165D97C19F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B434ACFB-2B01-491A-B2E5-40FA0E11B3B1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF88CADB-AB36-4633-807B-44AB3145F748" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D9830C2-0E2D-4A5A-B78F-5D4A4721B268" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99DDA8A0-0A26-4379-B843-4E0B5FDD544F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "907A3F7F-B11D-4CF1-A1B2-A28BBEBF03C3" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE4657B8-B691-4833-8546-220AD2BA8A7D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2455F37-66D8-4BE1-8739-1A20A2E5375D" } ], "operator": "OR" } ] } ]