There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93 | Mailing List Patch Vendor Advisory |
https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49 | Patch Third Party Advisory |
https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93 | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-30 06:15
Updated : 2023-02-06 13:48
NVD link : CVE-2023-0240
Mitre link : CVE-2023-0240
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
linux
- linux_kernel