7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.0004 Low
EPSS
Percentile
9.1%
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can
be exploited to achieve local privilege escalation. Both
io_install_fixed_file and its callers call fput in a file in case of an
error, causing a reference underflow which leads to a use-after-free
vulnerability. We recommend upgrading past commit
9d94c04c0db024922e886c9fd429659f22f48ea4.
Author | Note |
---|---|
sbeattie | appears to be a duplicate of CVE-2023-0469 |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 22.10 | noarch | linux | < 5.19.0-38.39 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-aws | < 5.19.0-1022.23 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-azure | < 5.19.0-1022.23 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-gcp | < 5.19.0-1019.21 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-hwe-5.19 | < 5.19.0-38.39~22.04.1 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-ibm | < 5.19.0-1019.21 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-kvm | < 5.19.0-1020.21 | UNKNOWN |
ubuntu | 22.10 | noarch | linux-lowlatency | < 5.19.0-1021.22 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-lowlatency-hwe-5.19 | < 5.19.0-1021.22~22.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | linux-oem-6.0 | < 6.0.0-1012.12 | UNKNOWN |
git.kernel.org/linus/9d94c04c0db024922e886c9fd429659f22f48ea4 (6.1-rc7)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4
kernel.dance/9d94c04c0db024922e886c9fd429659f22f48ea4
launchpad.net/bugs/cve/CVE-2023-2236
nvd.nist.gov/vuln/detail/CVE-2023-2236
security-tracker.debian.org/tracker/CVE-2023-2236
www.cve.org/CVERecord?id=CVE-2023-2236