CVE-2023-1295 — Time-of-check Time-of-use (TOCTOU) Race Condition in Kernel
Severity
7.0HIGHNVD
EPSS
0.0%
top 94.56%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 28
Description
A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5.6 - 5.11 (inclusive), which allows a local user to elevate their privileges to root. Introduced in b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb, patched in 9eac1904d3364254d622bf2c771c4f85cd435fc2, backported to stable in 788d0824269bef539fe31a785b1517882eafed93.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-3gcx-wjr4-jv32: A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5↗2023-06-28
OSV▶
CVE-2023-1295: A time-of-check to time-of-use issue exists in io_uring subsystem's IORING_OP_CLOSE operation in the Linux kernel's versions 5↗2023-06-28
GHSA▶
Vaadin vulnerable to possible information disclosure of class and method names in RPC response↗2023-06-22