A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.
Both ioinstallfixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.
We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2236.json"
[
{
"events": [
{
"introduced": "5.19"
},
{
"fixed": "6.0.11"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h300s"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h410c"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h410s"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h500s"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "h700s"
}
]
}
]