{"api_version":"1","generated_at":"2026-04-22T23:53:27+00:00","cve":"CVE-2023-21400","urls":{"html":"https://cve.report/CVE-2023-21400","api":"https://cve.report/api/cve/CVE-2023-21400.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-21400","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-21400"},"summary":{"title":"CVE-2023-21400","description":"In multiple functions  of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.","state":"PUBLIC","assigner":"security@android.com","published_at":"2023-07-13 00:15:00","updated_at":"2024-01-19 16:15:00"},"problem_types":["CWE-667"],"metrics":[],"references":[{"url":"http://www.openwall.com/lists/oss-security/2023/07/14/2","name":"http://www.openwall.com/lists/oss-security/2023/07/14/2","refsource":"MISC","tags":[],"title":"oss-security - Re: Our learnings from 42 Linux kernel exploits, we are limiting io_uring","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","name":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","refsource":"MISC","tags":[],"title":"[SECURITY] [DLA 3623-1] linux-5.10 security update","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.debian.org/security/2023/dsa-5480","name":"https://www.debian.org/security/2023/dsa-5480","refsource":"MISC","tags":[],"title":"Debian -- Security Information -- DSA-5480-1 linux","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://source.android.com/security/bulletin/pixel/2023-07-01","name":"https://source.android.com/security/bulletin/pixel/2023-07-01","refsource":"MISC","tags":[],"title":"Pixel Update Bulletin—July 2023  |  Android Open Source Project","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/19/7","name":"http://www.openwall.com/lists/oss-security/2023/07/19/7","refsource":"MISC","tags":[],"title":"oss-security - Re: Our learnings from 42 Linux kernel exploits, we\n are limiting io_uring","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://security.netapp.com/advisory/ntap-20240119-0012/","name":"https://security.netapp.com/advisory/ntap-20240119-0012/","refsource":"","tags":[],"title":"CVE-2023-21400 Linux Kernel Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","name":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","refsource":"MISC","tags":[],"title":"Kernel Live Patch Security Notice LSN-0098-1 ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/19/2","name":"http://www.openwall.com/lists/oss-security/2023/07/19/2","refsource":"MISC","tags":[],"title":"oss-security - Re: Our learnings from 42 Linux kernel exploits, we\n are limiting io_uring","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/25/7","name":"http://www.openwall.com/lists/oss-security/2023/07/25/7","refsource":"MISC","tags":[],"title":"oss-security - Re: Our learnings from 42 Linux kernel exploits, we\n are limiting io_uring","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-21400","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-21400","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"21400","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"21400","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"21400","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"google","cpe5":"android","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-21400","qid":"6000212","title":"Debian Security Update for linux (DSA 5480-1)"},{"cve":"CVE-2023-21400","qid":"6000265","title":"Debian Security Update for linux-5.10 (DLA 3623-1)"},{"cve":"CVE-2023-21400","qid":"673406","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-3182)"},{"cve":"CVE-2023-21400","qid":"673595","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-3247)"},{"cve":"CVE-2023-21400","qid":"673692","title":"EulerOS Security Update for kernel (EulerOS-SA-2023-3275)"},{"cve":"CVE-2023-21400","qid":"754866","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3684-1)"},{"cve":"CVE-2023-21400","qid":"754876","title":"SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2023:3687-1)"}]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-21400","ASSIGNER":"security@android.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"In multiple functions  of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of privilege"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Google","product":{"product_data":[{"product_name":"Android","version":{"version_data":[{"version_affected":"=","version_value":"Android kernel"}]}}]}}]}},"references":{"reference_data":[{"url":"https://source.android.com/security/bulletin/pixel/2023-07-01","refsource":"MISC","name":"https://source.android.com/security/bulletin/pixel/2023-07-01"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/14/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/07/14/2"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/19/2","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/07/19/2"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/19/7","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/07/19/7"},{"url":"http://www.openwall.com/lists/oss-security/2023/07/25/7","refsource":"MISC","name":"http://www.openwall.com/lists/oss-security/2023/07/25/7"},{"url":"https://www.debian.org/security/2023/dsa-5480","refsource":"MISC","name":"https://www.debian.org/security/2023/dsa-5480"},{"url":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html","refsource":"MISC","name":"http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html"},{"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html","refsource":"MISC","name":"https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"}]}},"nvd":{"publishedDate":"2023-07-13 00:15:00","lastModifiedDate":"2024-01-19 16:15:00","problem_types":["CWE-667"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}