The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.

Project Subscriptions

Vendors Products
Canonical Subscribe
Ubuntu Linux Subscribe
Linux Kernel Subscribe
Opensuse Subscribe
Opensuse Subscribe
Enterprise Linux Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Mrg Subscribe
Rhel Eus Subscribe
Rhel Mission Critical Subscribe
Linux Enterprise Desktop Subscribe
Linux Enterprise High Availability Extension Subscribe
Linux Enterprise Real Time Extension Subscribe
Linux Enterprise Server Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-2949-1 linux security update
Debian DSA Debian DSA DSA-2950-1 openssl security update
Ubuntu USN Ubuntu USN USN-2233-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2234-1 Linux kernel (EC2) vulnerabilities
Ubuntu USN Ubuntu USN USN-2235-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2236-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-2237-1 Linux kernel (Quantal HWE) vulnerability
Ubuntu USN Ubuntu USN USN-2238-1 Linux kernel (Raring HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2239-1 Linux kernel (Saucy HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2240-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2241-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2260-1 Linux kernel (Trusty HWE) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9c243a5a6de0be8e584c604d353412584b592f8 cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-0771.html cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-3037.html cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-3038.html cve-icon cve-icon
http://linux.oracle.com/errata/ELSA-2014-3039.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.html cve-icon cve-icon
http://openwall.com/lists/oss-security/2014/06/05/24 cve-icon cve-icon
http://openwall.com/lists/oss-security/2014/06/06/20 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0800.html cve-icon cve-icon
http://secunia.com/advisories/58500 cve-icon cve-icon
http://secunia.com/advisories/58990 cve-icon cve-icon
http://secunia.com/advisories/59029 cve-icon cve-icon
http://secunia.com/advisories/59092 cve-icon cve-icon
http://secunia.com/advisories/59153 cve-icon cve-icon
http://secunia.com/advisories/59262 cve-icon cve-icon
http://secunia.com/advisories/59309 cve-icon cve-icon
http://secunia.com/advisories/59386 cve-icon cve-icon
http://secunia.com/advisories/59599 cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2949 cve-icon cve-icon
http://www.exploit-db.com/exploits/35370 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2014/06/05/22 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2021/02/01/4 cve-icon cve-icon
http://www.securityfocus.com/bid/67906 cve-icon cve-icon
http://www.securitytracker.com/id/1030451 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2237-1 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2240-1 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1103626 cve-icon cve-icon
https://elongl.github.io/exploitation/2021/01/08/cve-2014-3153.html cve-icon cve-icon
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13fbca4c6ecd96ec1a1cfa2e4f2ce191fe928a5e cve-icon cve-icon
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54a217887a7b658e2650c3feff22756ab80c7339 cve-icon cve-icon
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b3eaa9fc5cd0a4d74b18f6b8dc617aeaf1873270 cve-icon cve-icon
https://github.com/elongl/CVE-2014-3153 cve-icon cve-icon
https://github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2014-3153 cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog cve-icon
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-3153 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2014-3153 cve-icon
https://www.openwall.com/lists/oss-security/2021/02/01/4 cve-icon cve-icon
History

Wed, 22 Oct 2025 01:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Mon, 03 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-05-25'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 13 Aug 2024 23:45:00 +0000

Type Values Removed Values Added
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2025-10-22T00:05:37.360Z

Reserved: 2014-05-03T00:00:00.000Z

Link: CVE-2014-3153

cve-icon Vulnrichment

Updated: 2024-08-06T10:35:56.633Z

cve-icon NVD

Status : Deferred

Published: 2014-06-07T14:55:27.240

Modified: 2025-10-22T01:15:56.410

Link: CVE-2014-3153

cve-icon Redhat

Severity : Important

Publid Date: 2014-06-04T00:00:00Z

Links: CVE-2014-3153 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses