{ "schema_version": "1.4.0", "id": "GHSA-rr76-fj9v-7w82", "modified": "2023-02-07T00:30:26Z", "published": "2023-01-30T15:30:36Z", "aliases": [ "CVE-2023-0240" ], "details": "There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0240" }, { "type": "WEB", "url": "https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49" }, { "type": "WEB", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93" }, { "type": "WEB", "url": "https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93" } ], "database_specific": { "cwe_ids": [ "CWE-416" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-01-30T14:15:00Z" } }