Linux Kernel Privilege Escalation Vulnerability Found in RDS Over TCP
#1
Quote:A memory corruption vulnerability recently found in Linux Kernel’s implementation of RDS over TCP could lead to privilege escalation. 
 
Tracked as CVE-2019-11815 and featuring a CVSS base score of 8.1, the flaw impacts Linux kernels prior to 5.0.8, but only systems that use the Reliable Datagram Sockets (RDS) for the TCP module.
 
The issue, a NIST advisory reveals, is a race condition that affects the kernel’s rds_tcp_kill_sock in net/rds/tcp.c. The bug leads to a use-after-free, related to net namespace cleanup, the advisory reveals. 
 
“A system that has the rds_tcp kernel module loaded (either through autoload via local process running listen(), or manual loading) could possibly cause a use after free (UAF) in which an attacker who is able to manipulate socket state while a network namespace is being torn down,” the Red Hat advisory on this bug reads

Apparently, the vulnerability can be exploited over the network and requires no privileges or user interaction, although the complexity of a successful attack is rather high. An attacker could abuse the issue to access restricted information or cause denial of service. 

SOURCE: https://www.securityweek.com/linux-kerne...s-over-tcp
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
K-Lite Codec Pack 19.6.0 / 19.6.1 Update
Changes in 19.6.0:...harlan4096 — 11:42
Free Download Manager 6.33.2.6656
Changes in 6.33.2....harlan4096 — 11:41
Vivaldi 7.9 Build 3970.45
Vivaldi 7.9 Build ...harlan4096 — 11:40
Apples Releases the 26.4 Versions of iOS...
Apple has just rel...harlan4096 — 11:38
Opera 129.0.5823.22
Hello! Opera st...harlan4096 — 11:37

[-]
Birthdays
Today's Birthdays
avatar (44)gapedDow
avatar (38)snorydar
Upcoming Birthdays
avatar (46)qaqapeti

[-]
Online Staff
There are no staff members currently online.

>