📜 ⬆️ ⬇️

Linux kernel vulnerability to get local root


Vulnerability allows a local user to elevate privileges to root.
Vulnerable versions of the kernel from 2.6.31-rc3 to 3.15-rc5.
CVE-2014-0196

The problem is caused by an error in the n_tty_write function (drivers / tty / n_tty.c), which incorrectly handled the access to the virtual terminal using the “LECHO &! OPOST” flags, which allowed the user to initiate damage to the kernel memory areas.

In one of four cases, the use of an exploit causes a kernel crash.
')
The exploit works only on kernels> = v3.14-rc1, since it added:
tty: Halve flip buffer GFP_ATOMIC memory consumption 

git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=acc0f67f307f52f7aec1cffdc40a786c15dd21d9
On which the exploit relies.

Discussion on linux.org.ru: www.linux.org.ru/news/security/10479079

An article on ArsTechnica arstechnica.com/security/2014/05/linux-gets-fix-for-code-execution-flaw-that-went-unpatched-since-2009

Bug Report: bugzilla.novell.com/show_bug.cgi?id=875690

CVE: cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196

POC-Discussion: www.openwall.com/lists/oss-security/2014/05/12/3

Source: https://habr.com/ru/post/222541/


All Articles