6.9
CVE-2014-0205
- EPSS 0.04%
- Published 28.09.2014 19:55:05
- Last modified 12.04.2025 10:46:40
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.
Data is provided by the National Vulnerability Database (NVD)
Linux ≫ Linux Kernel Version <= 2.6.36.4
Linux ≫ Linux Kernel Version2.6.36
Linux ≫ Linux Kernel Version2.6.36 Updaterc1
Linux ≫ Linux Kernel Version2.6.36 Updaterc2
Linux ≫ Linux Kernel Version2.6.36 Updaterc3
Linux ≫ Linux Kernel Version2.6.36 Updaterc4
Linux ≫ Linux Kernel Version2.6.36 Updaterc5
Linux ≫ Linux Kernel Version2.6.36 Updaterc6
Linux ≫ Linux Kernel Version2.6.36 Updaterc7
Linux ≫ Linux Kernel Version2.6.36 Updaterc8
Linux ≫ Linux Kernel Version2.6.36.1
Linux ≫ Linux Kernel Version2.6.36.2
Linux ≫ Linux Kernel Version2.6.36.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.093 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.9 | 3.4 | 10 |
AV:L/AC:M/Au:N/C:C/I:C/A:C
|
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.