Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
References
Link | Resource |
---|---|
https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom | Exploit Third Party Advisory |
https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-31T02:50:35
Updated: 2019-12-31T02:50:35
Reserved: 2019-12-31T00:00:00
Link: CVE-2019-20172
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-12-31T03:15:10.467
Modified: 2022-12-08T18:55:41.790
Link: CVE-2019-20172
JSON object: View
Redhat Information
No data.
CWE