Published: 12/02/2019 Updated: 12/02/2019

Vulnerability Summary

FreeBSD control message privilege escalation

In FreeBSD 11.2-STABLE after r338618 and before r343786, 12.0-STABLE before r343781, and 12.0-RELEASE before 12.0-RELEASE-p3, a bug in the reference count implementation for UNIX domain sockets can cause a file structure to be incorrectly released potentially allowing a malicious local user to gain root privileges or escape from a jail.

FreeBSD could allow a local authenticated attacker to gain elevated privileges on the system, caused by improper handling of large buffer for an incoming control message. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to gain root privileges or escape from a jail.

Vulnerability Trend

Mailing Lists

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-19:02fd Security Advisory The FreeBSD Project Topic: File description reference count leak Category: ...