Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
References
Link | Resource |
---|---|
https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom | Exploit Third Party Advisory |
https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9 | Patch Third Party Advisory |
Configurations
Information
Published : 2019-12-30 19:15
Updated : 2022-12-08 10:55
NVD link : CVE-2019-20172
Mitre link : CVE-2019-20172
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
serenityos
- serenityos