Логотип exploitDog
bind:CVE-2024-43102
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-43102

Количество 3

Количество 3

nvd логотип

CVE-2024-43102

больше 1 года назад

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.

CVSS3: 10
EPSS: Низкий
github логотип

GHSA-v72r-7947-x8jx

больше 1 года назад

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2024-06795

больше 1 года назад

Уязвимость системного вызова _umtx_op операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-43102

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.

CVSS3: 10
1%
Низкий
больше 1 года назад
github логотип
GHSA-v72r-7947-x8jx

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too early. A malicious code exercizing the UMTX_SHM_DESTROY sub-request in parallel can panic the kernel or enable further Use-After-Free attacks, potentially including code execution or Capsicum sandbox escape.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2024-06795

Уязвимость системного вызова _umtx_op операционных систем FreeBSD, позволяющая нарушителю выполнить произвольный код

CVSS3: 10
1%
Низкий
больше 1 года назад

Уязвимостей на страницу