First published: Wed Apr 12 2023(Updated: )
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <5.17 | |
Linux Kernel | >=5.7<5.17 | |
Debian Linux | =10.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.25-1 6.12.27-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1872 has a high severity rating due to its potential for local privilege escalation.
To fix CVE-2023-1872, upgrade the Linux Kernel to versions 5.10.223-1, 5.10.226-1, 6.1.119-1, 6.1.123-1, 6.12.11-1, or 6.12.12-1.
The vulnerable Linux Kernel versions are from 5.7 up to but not including 5.17.
A use-after-free vulnerability occurs when a program continues to use a pointer after the memory it points to has been released, potentially allowing for privilege escalation.
Debian 10.0 and any Linux Kernel versions from 5.7 to 5.17 are affected by CVE-2023-1872.