CVE-2023-2236Use After Free in Kernel

CWE-416Use After Free7 documents7 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 91.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 1
Latest updateJul 6

Description

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages4 packages

CVEListV5linux/linux_kernel5.196.1
NVDlinux/linux_kernel5.196.0.11
Debianlinux/linux_kernel< 6.0.12-1+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-j4r5-9qqm-p694: A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation2023-07-06
OSV
CVE-2023-2236: A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation2023-05-01
CVEList
Use-after-free in Linux kernel's Performance Events subsystem2023-05-01

📋Vendor Advisories

2
Debian
CVE-2023-2236: linux - A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exp...2023
Red Hat
kernel: use-after-free in io_uring/filetable in io_install_fixed_file2022-11-23

💬Community

1
Bugzilla
CVE-2023-2236 kernel: use-after-free in io_uring/filetable in io_install_fixed_file2023-05-10
CVE-2023-2236 — Use After Free in Linux Kernel | cvebase