This vulnerability allows local attackers to escalate privileges on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of buffers in io_uring. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before accessing memory. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel.
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu Unattended Upgrades |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-21-589 has a critical severity rating as it allows local privilege escalation on vulnerable Ubuntu installations.
To fix ZDI-21-589, you should update the affected packages in your Ubuntu installation as per the security advisories.
ZDI-21-589 affects specific versions of Ubuntu that use the vulnerable libdevmapper1.02.1 package.
No, ZDI-21-589 requires local access to the system to exploit the vulnerability.
ZDI-21-589 is associated with local privilege escalation attacks.