Bug 2263943 (CVE-2024-24259) - CVE-2024-24259 freeglut: memory leak via glutAddMenuEntry() function
Summary: CVE-2024-24259 freeglut: memory leak via glutAddMenuEntry() function
Keywords:
Status: NEW
Alias: CVE-2024-24259
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2263946
Blocks: 2263935
TreeView+ depends on / blocked
 
Reported: 2024-02-12 22:11 UTC by Robb Gatica
Modified: 2024-06-09 16:41 UTC (History)
0 users

Fixed In Version:
Doc Type: ---
Doc Text:
A memory leak flaw was found in the glutAddMenuEntry function of freeglut, an open-source alternative to the OpenGL Utility Toolkit. This issue may allow an attacker to launch a denial of service attack by crashing or hanging the program or take advantage of other unexpected program behavior resulting from a low memory condition.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:2366 0 None None None 2024-04-30 10:05:46 UTC
Red Hat Product Errata RHSA-2024:3120 0 None None None 2024-05-22 09:46:45 UTC

Description Robb Gatica 2024-02-12 22:11:57 UTC
freeglut through 3.4.0 was discovered to contain a memory leak via the menuEntry variable in the glutAddMenuEntry function.

Reference:
https://github.com/freeglut/freeglut/pull/155

Comment 1 Robb Gatica 2024-02-12 22:12:46 UTC
Created freeglut tracking bugs for this issue:

Affects: fedora-all [bug 2263946]

Comment 3 errata-xmlrpc 2024-04-30 10:05:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:2366 https://access.redhat.com/errata/RHSA-2024:2366

Comment 4 errata-xmlrpc 2024-05-22 09:46:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:3120 https://access.redhat.com/errata/RHSA-2024:3120


Note You need to log in before you can comment on or make changes to this bug.