Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-0205

Опубликовано: 28 сент. 2014
Источник: debian
EPSS Низкий

Описание

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed2.6.37package
linux-2.6fixed2.6.37-1package
linux-2.6fixed2.6.32-28squeezepackage

Примечания

  • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7ada876a8703f23befbb20a7465a702ee39b1704 (v2.6.37)

  • https://lkml.org/lkml/2010/9/16/99

  • Introduced in f801073f87aa2 (around 2.6.31) according to SuSE Bugzilla

EPSS

Процентиль: 12%
0.00041
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

redhat
почти 11 лет назад

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

nvd
больше 10 лет назад

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

github
около 3 лет назад

The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.

oracle-oval
почти 11 лет назад

ELSA-2014-3073: unbreakable enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 12%
0.00041
Низкий