A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2024-0582 | Third Party Advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 | Issue Tracking Mailing List |
https://bugzilla.redhat.com/show_bug.cgi?id=2254050 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d | Mailing List Patch |
http://www.openwall.com/lists/oss-security/2024/04/24/3 | |
https://access.redhat.com/security/cve/CVE-2024-0582 | Third Party Advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 | Issue Tracking Mailing List |
https://bugzilla.redhat.com/show_bug.cgi?id=2254050 | Issue Tracking Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d | Mailing List Patch |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://access.redhat.com/security/cve/CVE-2024-0582 - Third Party Advisory | |
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 - Issue Tracking, Mailing List | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2254050 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d - Mailing List, Patch |
23 Sep 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Jan 2024, 18:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-416 | |
CPE | cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
First Time |
Linux
Linux linux Kernel |
|
References | () https://access.redhat.com/security/cve/CVE-2024-0582 - Third Party Advisory | |
References | () https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 - Issue Tracking, Mailing List | |
References | () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d - Mailing List, Patch | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2254050 - Issue Tracking, Patch, Third Party Advisory |
16 Jan 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-16 15:15
Updated : 2024-11-21 08:46
NVD link : CVE-2024-0582
Mitre link : CVE-2024-0582
CVE.ORG link : CVE-2024-0582
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free