View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0001394 | Kali Linux | General Bug | public | 2014-06-07 16:02 | 2015-08-18 12:45 |
| Reporter | 9h05t | Assigned To | muts | ||
| Priority | normal | Severity | major | Reproducibility | always |
| Status | closed | Resolution | no change required | ||
| Platform | x64 | OS | Kali | OS Version | 1.0 |
| Product Version | 1.0.7 | ||||
| Summary | 0001394: Linux Kernel Vulnerable! | ||||
| Description | The latest kernel update for KALI LINUX is vulnerable to "futex subsystem call".An unprivileged user could use this flaw to crash the kernel (resulting in DOS) or for privilege escalation.Specifically, the futex syscall can leave a queued kernel waiter hanging on the stack. By manipulating the stack with further syscalls, the waiter structure can be altered. | ||||
| Additional Information | Linux Vulnerability: | ||||
|
Thanks for this report. We take our security fixes from Debian, and our repos update every 4 hours. This includes upstream fixes to the kernel. |
|
|
So are you fixing it or working on the patch? |
|
|
Yes, in 3.14.5-1kali2 to be released soon. |
|
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2014-06-07 16:02 | 9h05t | New Issue | |
| 2014-06-07 16:07 | muts | Note Added: 0002058 | |
| 2014-06-07 16:07 | muts | Status | new => closed |
| 2014-06-07 16:07 | muts | Assigned To | => muts |
| 2014-06-07 16:07 | muts | Resolution | open => no change required |
| 2014-06-07 16:17 | 9h05t | Note Added: 0002059 | |
| 2014-06-07 16:17 | 9h05t | Status | closed => feedback |
| 2014-06-07 16:17 | 9h05t | Resolution | no change required => reopened |
| 2014-06-07 17:17 | muts | Note Added: 0002060 | |
| 2014-06-07 17:17 | muts | Status | feedback => closed |
| 2014-06-07 17:17 | muts | Resolution | reopened => no change required |
| 2014-06-07 17:17 | muts | Note Edited: 0002060 | |
| 2015-08-18 12:45 | g0tmi1k | Priority | immediate => normal |