First published: Wed Jun 28 2023(Updated: )
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).
Credit: cve-coordination@google.com cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.10.162<5.10.185 | |
Linux Kernel | >=5.13<6.4 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =20.04 | |
Ubuntu | =22.04 | |
Debian | =10.0 | |
Debian | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3389 has a high severity rating due to its potential for local privilege escalation.
To address CVE-2023-3389, upgrade your Linux kernel to a version that includes the security fixes, such as 5.10.223-1 or 6.12.12-1.
CVE-2023-3389 affects several distributions including multiple versions of Ubuntu and Debian Linux.
CVE-2023-3389 is caused by a use-after-free condition in the Linux Kernel io_uring subsystem when racing cancel poll requests.
Versions from 5.10.162 to 5.10.185 and from 5.13 to 6.4 of the Linux Kernel are vulnerable to CVE-2023-3389.