Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
A double-free flaw in the copy_from_user() function allows an attacker to execute arbitrary code on the system in shiftfs (out-of-tree stacking file system). The attacker can exploit this vulnerability by sending specially crafted ioctls requests to cause kernel memory consumption (denial of service) in the system or execute arbitrary codes.
In the overlayfs stacking file system in the kernel, an authenticated attacker can gain elevated privileges on the system caused by the improper validation of filing capabilities against user namespaces. The attacker can exploit this vulnerability by sending specially crafted requests along with a patch carried in the Ubuntu kernel to gain elevated privileges.
Ubuntu
Download the latest patches for Ubuntu and refer to the Ubuntu website for information on upgrades or suggested workarounds at