Memory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation

CVE-2024-0582

7.8HIGH

Key Information

Vendor
Red Hat
Status
kernel
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Vendor
CVE Published:
16 January 2024

Badges

📈 Trended📈 Score: 6,390👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2024-0582?

CVE-2024-0582 is a vulnerability identified in the Linux kernel's io_uring functionality, which is designed for high-performance input/output operations. This flaw relates to how a user registers a buffer ring using the IORING_REGISTER_PBUF_RING method and subsequently manages memory with mmap() and free. Due to this vulnerability, a local user could exploit the memory leak, potentially leading to system crashes or privilege escalation. Such an escalation could enable unauthorized activities on the system, adversely impacting organizational security and operational integrity.

Technical Details

The vulnerability resides in the io_uring subsystem of the Linux kernel, specifically in the way buffers are managed when registered and accessed. The issue arises when a user registers a buffer ring with the IORING_REGISTER_PBUF_RING command and uses mmap() to map this buffer into memory. Upon freeing the buffer, the system fails to properly handle the memory allocated for the buffer, leading to a memory leak. This flaw can be exploited by local users who can thus increase their system privileges by manipulating the utilization of these buffers.

Impact of the Vulnerability

  1. Privilege Escalation: The primary impact of CVE-2024-0582 is the potential for local users to elevate their privileges on the affected system, which could allow them to execute unauthorized commands or access restricted data.

  2. System Stability Risks: The memory leak associated with this vulnerability can lead to system instability, resulting in crashes or degraded performance, which could disrupt critical services and operations within an organization.

  3. Increased Attack Surface: The existence of this vulnerability may encourage malicious actors to attempt further exploits based on the elevated privileges gained, thereby broadening the attack surface and increasing the likelihood of additional compromises.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Top Cyber Security Informer Penetration Testing Security Awareness Content for March, 2024

Best content around Penetration Testing Security Awareness selected by the Cyber Security Informer community.

6 months ago

Linux Kernel Flaw Let Attackers Gain Full Root Access: PoC Published

A critical vulnerability in the Linux kernel's io_uring subsystem, which could allow attackers to gain full root access to affected systems.

9 months ago

Mind the Patch Gap: Exploiting an io_uring Vulnerability in Ubuntu - Exodus Intelligence

By Oriol Castejón Overview In early January 2024, a Project Zero issue for a recently fixed io_uring use-after-free (UAF) vulnerability (CVE-2024-0582) was made public. Reading the issue description, it was apparent that the vulnerability allowed an attacker to obtain read and write access to a numb...

9 months ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 📈

    Vulnerability started trending

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by Exodus Intelligence

  • Vulnerability Reserved

  • Vulnerability published

Collectors

NVD DatabaseMitre Database3 Proof of Concept(s)3 News Article(s)

Credit

Red Hat would like to thank Jann Horn (Google Project Zero) for reporting this issue.
.