CVE-2023-1872Use After Free in Kernel

CWE-416Use After Free21 documents8 sources
Severity
7.0HIGHNVD
OSV7.8OSV4.7
EPSS
0.0%
top 93.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12
Latest updateAug 19

Description

A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.0 | Impact: 5.9

Affected Packages11 packages

NVDlinux/linux_kernel5.75.17
Debianlinux/linux_kernel< 5.10.178-1+3
Ubuntulinux/linux_kernel< 5.15.0-71.78+6
CVEListV5linux/linux_kernel5.75.17
debiandebian/linux< linux 5.17.3-1 (bookworm)

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

10
OSV
Kernel Live Patch Security Notice2024-04-03
OSV
Kernel Live Patch Security Notice2023-06-21
OSV
linux-intel-iotg vulnerabilities2023-06-01
OSV
linux-intel-iotg-5.15 vulnerabilities2023-06-01
OSV
linux-gcp-5.15 vulnerabilities2023-05-18

📋Vendor Advisories

9
Ubuntu
Kernel Live Patch Security Notice2024-04-03
Ubuntu
Kernel Live Patch Security Notice2023-06-21
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2023-06-01
Ubuntu
Linux kernel (Intel IoTG) vulnerabilities2023-06-01
Ubuntu
Linux kernel (GCP) vulnerabilities2023-05-18

📄Research Papers

1
arXiv
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects2024-08-19
CVE-2023-1872 — Use After Free in Linux Kernel | cvebase