A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
History

Thu, 13 Feb 2025 17:00:00 +0000

Type Values Removed Values Added
Description A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4. A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-02-13T16:43:51.607Z

Reserved: 2023-04-21T17:43:28.315Z

Link: CVE-2023-2236

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-05-01T13:15:44.850

Modified: 2025-02-13T17:16:20.363

Link: CVE-2023-2236

cve-icon Redhat

Severity : Important

Publid Date: 2022-11-23T06:30:00Z

Links: CVE-2023-2236 - Bugzilla