|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Linux kernel: use after free via futex_wait
Synthesis of the vulnerability
A local attacker can force the usage a freed memory area in the futex_wait() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code.
Impacted products: Linux, RHEL.
Severity of this bulletin: 2/4.
Consequences of an intrusion: administrator access/rights, privileged access/rights, user access/rights, denial of service on server.
Hacker's origin: user shell.
Creation date: 10/09/2014.
Références of this threat: 1094455, CERTFR-2014-AVI-381, CVE-2014-0205, RHSA-2014:1167-01, RHSA-2014:1365-01, RHSA-2014:1763-01, VIGILANCE-VUL-15315.
Description of the vulnerability
The Linux kernel can be compiled with the support of CONFIG_FUTEX (Fast Userspace Mutex).
However, when futexes are requeued during the execution of the futex_wait() function, a counter is reset to zero, and a memory area is prematurely freed.
A local attacker can therefore force the usage a freed memory area in the futex_wait() function of the Linux kernel, in order to trigger a denial of service, and possibly to execute code.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a network vulnerability announce. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.