Description
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.
The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.
We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.
We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3404-1 | linux-5.10 security update |
EUVD |
EUVD-2023-24074 | A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. |
Ubuntu USN |
USN-6044-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6051-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6070-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6107-1 | Linux kernel (GCP) vulnerabilities |
Ubuntu USN |
USN-6133-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6134-1 | Linux kernel (Intel IoTG) vulnerabilities |
References
History
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. | A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. |
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:39:40.499Z
Reserved: 2023-04-05T13:26:00.875Z
Link: CVE-2023-1872
No data.
Status : Modified
Published: 2023-04-12T16:15:17.027
Modified: 2025-02-13T17:16:00.567
Link: CVE-2023-1872
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN