CVE-2024-0582

A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*

History

21 Nov 2024, 08:46

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/24/3 -
References () https://access.redhat.com/security/cve/CVE-2024-0582 - Third Party Advisory () https://access.redhat.com/security/cve/CVE-2024-0582 - Third Party Advisory
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 - Issue Tracking, Mailing List () https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 - Issue Tracking, Mailing List
References () https://bugzilla.redhat.com/show_bug.cgi?id=2254050 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=2254050 - Issue Tracking, Patch, Third Party Advisory
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d - Mailing List, Patch () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d - Mailing List, Patch

23 Sep 2024, 20:15

Type Values Removed Values Added
References
  • {'url': 'http://www.openwall.com/lists/oss-security/2024/04/24/3', 'source': 'secalert@redhat.com'}

01 May 2024, 18:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/04/24/3 -

23 Jan 2024, 18:52

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
CPE cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://access.redhat.com/security/cve/CVE-2024-0582 - () https://access.redhat.com/security/cve/CVE-2024-0582 - Third Party Advisory
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 - () https://bugs.chromium.org/p/project-zero/issues/detail?id=2504 - Issue Tracking, Mailing List
References () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d - () https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d - Mailing List, Patch
References () https://bugzilla.redhat.com/show_bug.cgi?id=2254050 - () https://bugzilla.redhat.com/show_bug.cgi?id=2254050 - Issue Tracking, Patch, Third Party Advisory

16 Jan 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-16 15:15

Updated : 2024-11-21 08:46


NVD link : CVE-2024-0582

Mitre link : CVE-2024-0582

CVE.ORG link : CVE-2024-0582


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free