First published: Mon May 01 2023(Updated: )
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =6.1-rc2 | |
Linux Linux kernel | =6.1-rc5 | |
Linux Linux kernel | =6.1-rc1 | |
Linux Linux kernel | =6.1-rc3 | |
Linux Linux kernel | =6.1-rc4 | |
Linux Linux kernel | =6.1-rc6 | |
Linux Linux kernel | >=5.19<6.1 | |
Linux Linux kernel | >=5.19<6.0.11 | |
Netapp Hci Baseboard Management Controller | =h300s | |
Netapp Hci Baseboard Management Controller | =h410c | |
Netapp Hci Baseboard Management Controller | =h410s | |
Netapp Hci Baseboard Management Controller | =h500s | |
Netapp Hci Baseboard Management Controller | =h700s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2236 is a use-after-free vulnerability in the Linux Kernel io_uring subsystem that can be exploited for local privilege escalation.
The Linux Kernel versions 5.19 to 6.1-rc6, and certain Netapp Hci Baseboard Management Controller models (h300s, h410c, h410s, h500s, h700s) are affected by the CVE-2023-2236 vulnerability.
CVE-2023-2236 has a severity rating of high (7).
The CVE-2023-2236 vulnerability can be exploited through a use-after-free attack in the Linux Kernel io_uring subsystem, allowing an attacker to gain local privilege escalation.
It is recommended to apply the patch provided by the Linux Kernel development team and Netapp for the affected software versions to mitigate the CVE-2023-2236 vulnerability.