High severity7.8CISA KEVNVD Advisory· Published Jun 7, 2014· Updated Apr 21, 2026
CVE-2014-3153
CVE-2014-3153
Description
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.
Affected products
14cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*+ 1 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*
- cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_high_availability_extension:11:sp3:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_real_time_extension:11:sp3:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*
Patches
1e9c243a5a6dehttps://github.com/torvalds/linuxvia nvd-ref
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
38- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdMailing ListPatch
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdMailing ListPatch
- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdMailing ListPatch
- github.com/torvalds/linux/commit/e9c243a5a6de0be8e584c604d353412584b592f8nvdPatch
- www.debian.org/security/2014/dsa-2949nvdExploit
- elongl.github.io/exploitation/2021/01/08/cve-2014-3153.htmlnvdExploit
- linux.oracle.com/errata/ELSA-2014-0771.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-3037.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-3038.htmlnvdThird Party Advisory
- linux.oracle.com/errata/ELSA-2014-3039.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-06/msg00014.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-06/msg00018.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-06/msg00025.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-07/msg00006.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00006.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2014-10/msg00007.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-0800.htmlnvdThird Party Advisory
- www.exploit-db.com/exploits/35370nvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/67906nvdBroken LinkThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1030451nvdBroken LinkThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-2237-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-2240-1nvdThird Party Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingThird Party Advisory
- openwall.com/lists/oss-security/2014/06/05/24nvdMailing List
- openwall.com/lists/oss-security/2014/06/06/20nvdMailing List
- secunia.com/advisories/58500nvdBroken Link
- secunia.com/advisories/58990nvdBroken Link
- secunia.com/advisories/59029nvdBroken Link
- secunia.com/advisories/59092nvdBroken Link
- secunia.com/advisories/59153nvdBroken Link
- secunia.com/advisories/59262nvdBroken Link
- secunia.com/advisories/59309nvdBroken Link
- secunia.com/advisories/59386nvdBroken Link
- secunia.com/advisories/59599nvdBroken Link
- www.openwall.com/lists/oss-security/2014/06/05/22nvdMailing List
- www.openwall.com/lists/oss-security/2021/02/01/4nvdMailing List
- www.cisa.gov/known-exploited-vulnerabilities-catalognvdUS Government Resource
- www.openwall.com/lists/oss-security/2021/02/01/4nvdMailing List
News mentions
0No linked articles in our index yet.