CVE-2023-1872

Updated: 2025-02-13 22:56:11.227391

Description:

A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU kernel 5.14.0 7.0 HIGH Not Vulnerable 2024-01-19 16:11:13
AlmaLinux 9.2 FIPS kernel 5.14.0 7.0 HIGH Not Vulnerable 2024-01-19 16:10:12
CentOS 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-04-24 14:04:57
CentOS 7 ELS kernel 3.10.0 7.0 HIGH Not Vulnerable 2024-07-01 10:21:04
CentOS 8.4 ELS kernel 4.18.0 7.0 HIGH Not Vulnerable 2023-08-29 04:24:37
CentOS 8.5 ELS kernel 4.18.0 7.0 HIGH Not Vulnerable 2023-08-29 04:24:37
CloudLinux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-04-24 14:04:57
Oracle Linux 6 ELS kernel 2.6.32 7.0 HIGH Not Vulnerable 2023-04-24 14:04:56
Ubuntu 16.04 ELS linux 4.4.0 7.0 HIGH Not Vulnerable 2023-04-21 03:19:03
Ubuntu 16.04 ELS linux-hwe 4.15.0 7.0 HIGH Not Vulnerable 2023-04-21 03:19:05
Total: 11