7.8
CWE
416
Advisory Published
Updated

CVE-2023-2236: Use-after-free in Linux kernel's Performance Events subsystem

First published: Mon May 01 2023(Updated: )

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.

Credit: cve-coordination@google.com cve-coordination@google.com

Affected SoftwareAffected VersionHow to fix
Linux Linux kernel=6.1-rc2
Linux Linux kernel=6.1-rc5
Linux Linux kernel=6.1-rc1
Linux Linux kernel=6.1-rc3
Linux Linux kernel=6.1-rc4
Linux Linux kernel=6.1-rc6
Linux Linux kernel>=5.19<6.1
Linux Linux kernel>=5.19<6.0.11
Netapp Hci Baseboard Management Controller=h300s
Netapp Hci Baseboard Management Controller=h410c
Netapp Hci Baseboard Management Controller=h410s
Netapp Hci Baseboard Management Controller=h500s
Netapp Hci Baseboard Management Controller=h700s

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability with ID CVE-2023-2236?

    CVE-2023-2236 is a use-after-free vulnerability in the Linux Kernel io_uring subsystem that can be exploited for local privilege escalation.

  • What software is affected by the CVE-2023-2236 vulnerability?

    The Linux Kernel versions 5.19 to 6.1-rc6, and certain Netapp Hci Baseboard Management Controller models (h300s, h410c, h410s, h500s, h700s) are affected by the CVE-2023-2236 vulnerability.

  • What is the severity of CVE-2023-2236?

    CVE-2023-2236 has a severity rating of high (7).

  • How can the CVE-2023-2236 vulnerability be exploited?

    The CVE-2023-2236 vulnerability can be exploited through a use-after-free attack in the Linux Kernel io_uring subsystem, allowing an attacker to gain local privilege escalation.

  • What is the recommended action to mitigate CVE-2023-2236?

    It is recommended to apply the patch provided by the Linux Kernel development team and Netapp for the affected software versions to mitigate the CVE-2023-2236 vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203