CVE-2014-3153
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses,...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 03, 2014
- Published Date
- June 07, 2014
- Last Updated
- February 03, 2025
- Vendor
- n/a
- Product
- n/a
- Description
- The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Technical Impact
- total
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-05-25 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/local/futex_requeue.rb | 2025-04-29 11:01:10 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
futex_requeue
Type: metasploit • Created: Unknown
c4mx/Linux-kernel-code-injection_CVE-2014-3153
Type: github • Created: 2022-02-01 09:54:52 UTC • Stars: 0
elongl/CVE-2014-3153
Type: github • Created: 2020-10-31 11:39:11 UTC • Stars: 11
c3c/CVE-2014-3153
Type: github • Created: 2016-05-29 18:39:15 UTC • Stars: 0
zerodavinci/CVE-2014-3153-exploit
Type: github • Created: 2015-11-08 09:40:59 UTC • Stars: 5
lieanu/CVE-2014-3153
Type: github • Created: 2015-01-12 16:53:09 UTC • Stars: 17
timwr/CVE-2014-3153
Type: github • Created: 2014-07-24 13:28:00 UTC • Stars: 121