CVE-2023-0468
Published on: Not Yet Published
Last Modified on: 02/01/2023 03:59:00 PM UTC
Certain versions of Linux Kernel from Linux contain the following vulnerability:
A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.
- CVE-2023-0468 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 4.7 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | HIGH | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
2164024 – (CVE-2023-0468) CVE-2023-0468 Kernel: use-after-free in io_uring poll events due to race condition | bugzilla.redhat.com text/html |
![]() |
Related QID Numbers
- 199209 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5912-1)
- 199223 Ubuntu Security Notification for Linux kernel Vulnerabilities (USN-5935-1)
- 199227 Ubuntu Security Notification for Linux kernel (GKE) Vulnerabilities (USN-5938-1)
- 199229 Ubuntu Security Notification for Linux kernel (KVM) Vulnerabilities (USN-5941-1)
- 199243 Ubuntu Security Notification for Linux kernel (Intel IoTG) Vulnerabilities (USN-5962-1)
- 905360 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13162)
- 905364 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13169)
- 906388 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (13169-2)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Linux | Linux Kernel | All | All | All | All |
Operating System | Linux | Linux Kernel | 6.1 | - | All | All |
Operating System | Linux | Linux Kernel | 6.1 | rc1 | All | All |
Operating System | Linux | Linux Kernel | 6.1 | rc2 | All | All |
Operating System | Linux | Linux Kernel | 6.1 | rc3 | All | All |
Operating System | Linux | Linux Kernel | 6.1 | rc4 | All | All |
Operating System | Linux | Linux Kernel | 6.1 | rc5 | All | All |
Operating System | Linux | Linux Kernel | 6.1 | rc6 | All | All |
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*:
- cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-0468 : A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcompo… twitter.com/i/web/status/1… | 2023-01-26 21:51:59 |