A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.
Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.
We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4. | A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4. |

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-02-13T16:43:51.607Z
Reserved: 2023-04-21T17:43:28.315Z
Link: CVE-2023-2236

No data.

Status : Modified
Published: 2023-05-01T13:15:44.850
Modified: 2025-02-13T17:16:20.363
Link: CVE-2023-2236
