There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation.
In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.
References
Link | Resource |
---|---|
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93 | Mailing List Patch Vendor Advisory |
https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49 | Patch Third Party Advisory |
https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93 | Patch Third Party Advisory |
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93 | Mailing List Patch Vendor Advisory |
https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49 | Patch Third Party Advisory |
https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93 | Patch Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230316-0001/ |
Configurations
History
21 Nov 2024, 07:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
|
References | () https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93 - Mailing List, Patch, Vendor Advisory | |
References | () https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49 - Patch, Third Party Advisory | |
References | () https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93 - Patch, Third Party Advisory |
07 Nov 2023, 03:59
Type | Values Removed | Values Added |
---|---|---|
Summary | There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161. |
Information
Published : 2023-01-30 14:15
Updated : 2024-11-21 07:36
NVD link : CVE-2023-0240
Mitre link : CVE-2023-0240
CVE.ORG link : CVE-2023-0240
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free