Bugzilla – Bug 1210990
VUL-0: CVE-2023-2236: kernel: use-after-free in io_uring subsystem
Last modified: 2023-05-02 09:49:18 UTC
CVE-2023-2236 A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-2236 https://www.cve.org/CVERecord?id=CVE-2023-2236 http://www.cvedetails.com/cve/CVE-2023-2236/ https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4 https://kernel.dance/9d94c04c0db024922e886c9fd429659f22f48ea4
This is a fixup for 339f24b336d ("io_uring: allow allocated fixed files for openat/openat2") 61c1b44a21d7 ("io_uring: fix deadlock on iowq file slot alloc") both 5.19. 15-sp5 has them backported but it also has this follow up fix. I will just update the reference. 15-sp4 and older do not have none. Back to the security team.
Hmm, looking at the patch in 15-sp5 this is a duplicate of bug 1207521 CVE-2023-0469. Should the CVE be dismissed or should I add another reference?
Duplicate of bug 1207521 *** This bug has been marked as a duplicate of bug 1207521 ***