CVE-2023-1872

Updated: 2025-08-20 02:31:56.794911

Description:

A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 7.0

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Not Vulnerable 2024-01-19 16:10:12
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-04-24 14:04:57
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Not Vulnerable 2024-07-01 10:21:04
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Not Vulnerable 2023-08-29 04:24:37
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Not Vulnerable 2023-08-29 04:24:37
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-04-24 14:04:57
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-04-24 14:04:56
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.0 HIGH Not Vulnerable 2023-04-21 03:19:05
Ubuntu 16.04 ELS linux 4.4.0 7.0 HIGH Not Vulnerable 2023-04-21 03:19:03
Ubuntu 18.04 ELS linux 4.15.0 7.0 HIGH Not Vulnerable 2023-08-29 09:15:35