First published: Tue Jan 24 2023(Updated: )
A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Kernel | <6.1 | 6.1 |
Linux Kernel | <6.1 | |
Linux Kernel | =6.1 | |
Linux Kernel | =6.1-rc1 | |
Linux Kernel | =6.1-rc2 | |
Linux Kernel | =6.1-rc3 | |
Linux Kernel | =6.1-rc4 | |
Linux Kernel | =6.1-rc5 | |
Linux Kernel | =6.1-rc6 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 6.12.11-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0468 is considered a high severity vulnerability due to the potential for NULL pointer dereference.
To fix CVE-2023-0468, update to Linux Kernel version 6.1 or apply the relevant patches from your distribution.
CVE-2023-0468 affects Linux Kernel versions up to 6.1, including several release candidates.
CVE-2023-0468 is caused by a use-after-free flaw due to a race condition in the io_uring/poll.c component.
As of now, there is no confirmation of active exploitation of CVE-2023-0468, but it is advisable to apply patches promptly.