Memory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation
CVE-2024-0582

7.8HIGH

Key Information:

Vendor

Red Hat

Vendor
CVE Published:
16 January 2024

Badges

📈 Trended📈 Score: 6,390👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2024-0582?

CVE-2024-0582 is a vulnerability identified in the Linux kernel's io_uring functionality, which is designed for high-performance input/output operations. This flaw relates to how a user registers a buffer ring using the IORING_REGISTER_PBUF_RING method and subsequently manages memory with mmap() and free. Due to this vulnerability, a local user could exploit the memory leak, potentially leading to system crashes or privilege escalation. Such an escalation could enable unauthorized activities on the system, adversely impacting organizational security and operational integrity.

Technical Details

The vulnerability resides in the io_uring subsystem of the Linux kernel, specifically in the way buffers are managed when registered and accessed. The issue arises when a user registers a buffer ring with the IORING_REGISTER_PBUF_RING command and uses mmap() to map this buffer into memory. Upon freeing the buffer, the system fails to properly handle the memory allocated for the buffer, leading to a memory leak. This flaw can be exploited by local users who can thus increase their system privileges by manipulating the utilization of these buffers.

Impact of the Vulnerability

  1. Privilege Escalation: The primary impact of CVE-2024-0582 is the potential for local users to elevate their privileges on the affected system, which could allow them to execute unauthorized commands or access restricted data.

  2. System Stability Risks: The memory leak associated with this vulnerability can lead to system instability, resulting in crashes or degraded performance, which could disrupt critical services and operations within an organization.

  3. Increased Attack Surface: The existence of this vulnerability may encourage malicious actors to attempt further exploits based on the elevated privileges gained, thereby broadening the attack surface and increasing the likelihood of additional compromises.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2024-0582 Impact, Exploitability, and Mitigation Steps | Wiz

Understand the critical aspects of CVE-2024-0582 with a detailed vulnerability assessment, exploitation potential, affected technologies, and remediation guidance.

3 weeks ago

oss-security - CVE-2024-0582 - Linux kernel use-after-free vulnerability in io_uring, writeup and exploit strategy

Products Openwall GNU/*/Linux server OS Linux Kernel Runtime Guard John the Ripper password cracker Free & Open Source for any platform in the cloud Pro for Linux Pro for macOS Wordlists for...

3 weeks ago

Technical Analysis of an io_uring exploit: CVE-2022-2602

This article explores the internals of an io_uring exploit for CVE-2022-2602 by employing the main tracing tools for the Linux kernel.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 📈

    Vulnerability started trending

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Exodus Intelligence

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Jann Horn (Google Project Zero) for reporting this issue.
.
CVE-2024-0582 : Memory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation