CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
5.1%
There is a logic error in io_uring’s implementation which can be used to
trigger a use-after-free vulnerability leading to privilege escalation. In
the io_prep_async_work function the assumption that the last
io_grab_identity call cannot return false is not true, and in this case the
function will use the init_cred or the previous linked requests identity to
do operations instead of using the current identity. This can lead to
reference counting issues causing use-after-free. We recommend upgrading
past version 5.10.161.
Author | Note |
---|---|
sbeattie | no fixes information given, so using 2b188cc1bb85 (“Add io_uring IO interface”) as an upper bounds on affected versions; this is almost surely incorrect. |
git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93
github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49
kernel.dance/#788d0824269bef539fe31a785b1517882eafed93
launchpad.net/bugs/cve/CVE-2023-0240
nvd.nist.gov/vuln/detail/CVE-2023-0240
security-tracker.debian.org/tracker/CVE-2023-0240
www.cve.org/CVERecord?id=CVE-2023-0240