NA

CVE-2024-0582

Published: 16/01/2024 Updated: 01/05/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 6.7

linux linux kernel

Vendor Advisories

Description<!---->A memory leak flaw was found in the Linux kernel’s io_uring functionality in how a user registers a buffer ring with IORING_REGISTER_PBUF_RING, mmap() it, and then frees it This flaw allows a local user to crash or potentially escalate their privileges on the systemA memory leak flaw was found in the Linux kernel’s io_uring ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> CVE-2024-0582 - Linux kernel use-after-free vulnerability in io_uring, writeup and exploit strategy <!--X-Subject-Header-End-- ...

Github Repositories

CVE-2024-0582: Serious Linux Kernel Bug Opens Door to System Takeovers, PoC Published Bypass latest Kernel User to root ---&gt;Usage python3 CVE-2024-0582py 通过利用错误配置的 setuid/setgid 二进制文件、功能和 sudo 权限,在 unix 系统上自动提升权限。专为 CTF 设计,但也适用于现实世界的渗透测试。✅ 功能 自动利用配置

LPE exploit for CVE-2024-0582 (io_uring)

io_uring_LPE-CVE-2024-0582 LPE exploit for CVE-2024-0582 I will not be releasing a write-up for this vulnerability as my method of exploitation is almost the same as for CVE-2023-2598 You can read the exploitation section of my write-up on CVE-2023-2598 to understand this exploit as well: Conquering the memory through io_uring - Analysis of CVE-2023-2598 If you want to read

CVE-CVE-2024-0582 latest kernel bypass root updated POC just run python file with root ____________________________________________________________________________________________________________________________________________________________________________________________________ ✅ Features 通过利用错误配置的 setuid/setgid 二进制文件、功能和 sudo 权限