The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability CVE-2014-0205

Linux kernel: use after free via futex_wait

Synthesis of the vulnerability

A local attacker can force the usage a freed memory area in the futex_wait() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code.
Impacted products: Linux, RHEL.
Severity of this bulletin: 2/4.
Consequences of an intrusion: administrator access/rights, privileged access/rights, user access/rights, denial of service on server.
Hacker's origin: user shell.
Creation date: 10/09/2014.
Références of this threat: 1094455, CERTFR-2014-AVI-381, CVE-2014-0205, RHSA-2014:1167-01, RHSA-2014:1365-01, RHSA-2014:1763-01, VIGILANCE-VUL-15315.

Description of the vulnerability

The Linux kernel can be compiled with the support of CONFIG_FUTEX (Fast Userspace Mutex).

However, when futexes are requeued during the execution of the futex_wait() function, a counter is reset to zero, and a memory area is prematurely freed.

A local attacker can therefore force the usage a freed memory area in the futex_wait() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides a network vulnerability announce. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.