Description
Kernel/VM/MemoryManager.cpp in SerenityOS before 2019-12-30 does not reject syscalls with pointers into the kernel-only virtual address space, which allows local users to gain privileges by overwriting a return address that was found on the kernel stack.
References (2)
Core 2
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/SerenityOS/serenity/commit/0fc24fe2564736689859e7edfa177a86dac36bf9
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Fire30/CTF-WRITEUPS/tree/master/36c3_ctf/wisdom
Scores
CVSS v3
7.8
EPSS
0.0014
EPSS Percentile
32.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-119
Status
published
Products (1)
serenityos/serenityos
< 2019-12-30
Published
Dec 31, 2019
Tracked Since
Feb 18, 2026