The flaw, which affects kernel versions from v2.7 through v6.12, enables attackers to escalate privileges and potentially execute arbitrary code at the kernel level—a critical threat for servers, desktops, and cloud environments relying on Linux.
According to the report, the vulnerability resides in the netfilter subsystem’s ipset feature, specifically within the bitmap_ip_uadt function.
This function is responsible for handling updates to IP sets, which are used for high-speed matching of IP addresses, networks, and ports in firewall rules.
The flaw emerges when the function processes requests containing the IPSET_ATTR_CIDR parameter without an accompanying IPSET_ATTR_IP_TO. In this scenario, a crucial range check on the starting IP address is inadvertently skipped.
As a result, the function may compute IP address ranges that extend beyond the allocated memory boundaries, leading to out-of-bounds (OOB) memory access.
This OOB access allows attackers to manipulate memory outside the intended area, opening the door to several exploitation techniques:
Security researchers have demonstrated a multi-stage exploitation process using the PoC.
The attack chain begins with leaking heap addresses, followed by arbitrary writes to gain further control over kernel memory.
Ultimately, the attacker can overwrite function pointers, such as those in the pipe_buffer structure—to hijack kernel control flow.
The final stage leverages the classic core_pattern technique: By overwriting the kernel’s crash handler path, the attacker ensures that a user-controlled binary is executed with root privileges whenever a process crashes.
This grants the attacker a root shell and complete control over the affected system.
CVE-2024-53141 impacts a broad range of Linux distributions, including Ubuntu, SUSE, and container-optimized OS variants, as confirmed in recent security bulletins.
The vulnerability has been rated with a CVSS score of 7.8, reflecting its high potential for privilege escalation and system compromise.
With a working exploit now available in the wild, system administrators are urged to take immediate action:
CVE-2024-53141 underscores the importance of rigorous input validation in kernel code and the risks posed by subtle bugs in widely used components.
With a PoC now public, timely patching is critical to prevent exploitation and safeguard Linux systems from kernel-level compromise.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates
The post Linux Kernel Privilege Escalation Vulnerability Gets PoC Release appeared first on Cyber Security News.
Spider-Man and Civil War star Kirsten Dunst is reportedly joining A Minecraft Movie 2 to…
The Secretlab Spring Sale has officially commenced and with it are a couple of different…
Since it debuted in 2016, if you wanted to watch the mega-blockbuster show Stranger Things,…
If you are planning a PC build and have been hoping to get ahold of…
CISA has added a high-severity vulnerability affecting the Zimbra Collaboration Suite (ZCS) to its Known…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert urging organizations…
This website uses cookies.