The Linux Kernel is reported prone to a local integer overflow vulnerability. The issue occurs in the 'poolsize_strategy' function of the 'random.c' kernel driver. The vulnerability exists due to a lack of sufficient sanitization performed on integer values before these values are employed as the size argument of a user-land to kernel memory copy operation. This vulnerability may be leveraged to corrupt kernel memory and ultimately execute arbitrary code with ring-0 privileges. Alternatively, the issue may be exploited to trigger a kernel panic. It is reported that a user must have UID 0 to exploit this issue, however the user does not require superuser privileges. This may hinder exploitability.
The Linux Kernel is reported prone to a local integer overflow vulnerability. The issue occurs in the 'poolsize_strategy' function of the 'random.c' kernel driver. The vulnerability exists due to a lack of sufficient sanitization performed on integer values before these values are employed as the size argument of a user-land to kernel memory copy operation. This vulnerability may be leveraged to corrupt kernel memory and ultimately execute arbitrary code with ring-0 privileges. Alternatively, the issue may be exploited to trigger a kernel panic. It is reported that a user must have UID 0 to exploit this issue, however the user does not require superuser privileges. This may hinder exploitability.