CVE-2023-52926Use After Free in Linux

CWE-416Use After Free6 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 98.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24
Latest updateJun 6

Description

In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return). This can lead to a potential use-after-free when the completion via io_rw_done runs at separate context.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages6 packages

NVDlinux/linux_kernel5.16.1.122+1
Debianlinux/linux_kernel< 6.1.123-1+2
CVEListV5linux/linux2b188cc1bb857a9d4701ae59aa7768b5124e262e72060434a14caea20925e492310d6e680e3f9007+3
debiandebian/linux< linux 6.1.123-1 (bookworm)
debiandebian/linux-6.1< linux 6.1.123-1 (bookworm)

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mq8h-f329-fxx2: In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o r2025-02-24
OSV
CVE-2023-52926: In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o re2025-02-24

📋Vendor Advisories

3
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2023-529262025-06-06
Red Hat
kernel: io_uring/rw: split io_read() into a helper2025-02-24
Debian
CVE-2023-52926: linux - In the Linux kernel, the following vulnerability has been resolved: IORING_OP_R...2023