Memory Leak Flaw in Linux Kernel's io_uring Could Lead to Privilege Escalation

CVE-2024-0582
7.8HIGH

Key Information

Vendor
Red Hat
Status
kernel
Red Hat Enterprise Linux 6
Red Hat Enterprise Linux 7
Red Hat Enterprise Linux 8
Vendor
CVE Published:
16 January 2024

Badges

😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The vulnerability CVE-2024-0582 is a memory leak flaw found in the Linux kernel's io_uring functionality. It allows a local user to crash or potentially escalate their privileges on the system, posing a risk of privilege escalation. Exploiting this vulnerability could lead to a data-only exploit, allowing a non-privileged user to achieve root privileges on affected systems. The vulnerability was patched in the stable release in December 2023, but it took over two months for the patch to be ported to Ubuntu kernels, creating a window of opportunity for exploitation. The exploitation mechanism relies on memory allocation in Linux and can potentially allow an attacker to modify system files, making the exploitation of this vulnerability a significant threat. Red Hat is the vendor affected and the vulnerability has been actively exploited.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability started trending.

  • 👾

    Exploit exists.

  • First article discovered by Exodus Intelligence

  • Vulnerability Reserved.

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database2 Proof of Concept(s)3 News Article(s)

Credit

Red Hat would like to thank Jann Horn (Google Project Zero) for reporting this issue.
.