摘要:
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
安全等级: Low
公告ID: KylinSec-SA-2023-1328
发布日期: 2023年5月9日
关联CVE: CVE-2023-2236
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2023-2236 | KY3.4-4A | kernel | Unaffected |
CVE-2023-2236 | KY3.4-5A | kernel | Unaffected |
CVE-2023-2236 | KY3.5.1 | kernel | Unaffected |