The vulnerability, assigned a CVSS score of 7.8, uncovered by researchers st424204 and d4em0n, specifically affects the bitmap:ip set type within the netfilter subsystem.
The flaw stems from improper handling of IPSET_ATTR_CIDR parameters when TB[IPSET_ATTR_IP_TO] is not present.
“When tb[IPSET_ATTR_IP_TO] is not present but tb[IPSET_ATTR_CIDR] exists, the values of ip and ip_to are slightly swapped. Therefore, the range check for ip should be done later, but this part is missing,” explains the Ubuntu security advisory.
The security implications are severe. The exploit chain documented in the researchers’ repository demonstrates how attackers can leverage this flaw to achieve:
The exploit code specifically targets the bitmap_ip implementation in net/netfilter/ipset/ip_set_bitmap_ip.c, where the vulnerability occurs in function calls like ip_to_id, which can be manipulated to return values far outside allocated memory ranges:
The PoC exploit leverages several advanced primitives:
| Risk Factors | Details |
| Affected Products | Linux kernel versions 2.6.39 to 4.19.325, 6.6.64, 6.11.11, and 6.12.2 (excluding patched versions) |
| Impact | Privilege escalation, kernel-level code execution, KASLR bypass, heap memory corruption, and root shell access. |
| Exploit Prerequisites | Local access with low privileges (CVSS:3.1/PR:L). SUSE rates it as requiring high privileges (PR:H |
| CVSS 3.1 Score | 7.8 (High) |
The vulnerability affects kernel versions from 2.6.39 through versions prior to 4.19.325, 6.6.64, 6.11.11, and 6.12.2. The exploit code in the repository specifically targets Linux kernel 6.6.62.
Security experts recommend immediate patching as the most effective mitigation. The fix, which adds proper range checks to the bitmap_ip_uadt function, has been incorporated into Linux kernels 4.19.325, 6.6.64, 6.11.11, 6.12.2, and later.
“This vulnerability provides threat actors with a powerful exploit chain that can ultimately lead to privilege escalation, KASLR bypass, and full kernel-level code execution,” reads the security advisory.
System administrators are advised to update affected systems immediately, as the public availability of exploit code significantly increases the likelihood of attacks targeting unpatched systems.
Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy
The post Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released appeared first on Cyber Security News.
Devil May Cry Season 2 debuts on Netflix on May 12.The first season of Devil…
Vanilla Scroll Sky is a pure CSS scrollytelling library that creates sticky image reveals and…
no.css is a pure CSS front-end framework that helps developers quickly create modern web pages…
DETROIT, MICH. (WOWO) Patients who rely on both Blue Cross Blue Shield and Michigan Medicine…
A new tool, BitUnlocker, reveals a practical downgrade attack against Microsoft’s BitLocker encryption, allowing attackers…
A fatal authentication bypass vulnerability is actively affecting cPanel and WebHost Manager (WHM) servers worldwide.…
This website uses cookies.