Lucene search

K
vulnrichmentLinuxVULNRICHMENT:CVE-2023-52895
HistoryAug 21, 2024 - 6:10 a.m.

CVE-2023-52895 io_uring/poll: don't reissue in case of poll race on multishot request

2024-08-2106:10:35
Linux
github.com
linux kernel
vulnerability
io_uring/poll
multishot request
buffer leakage

AI Score

6.8

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

In the Linux kernel, the following vulnerability has been resolved:

io_uring/poll: don’t reissue in case of poll race on multishot request

A previous commit fixed a poll race that can occur, but it’s only
applicable for multishot requests. For a multishot request, we can safely
ignore a spurious wakeup, as we never leave the waitqueue to begin with.

A blunt reissue of a multishot armed request can cause us to leak a
buffer, if they are ring provided. While this seems like a bug in itself,
it’s not really defined behavior to reissue a multishot request directly.
It’s less efficient to do so as well, and not required to rearm anything
like it is for singleshot poll requests.

AI Score

6.8

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

partial

Related for VULNRICHMENT:CVE-2023-52895