CVE-2023-3389 - Use After Free

Severity

78%

Complexity

18%

Confidentiality

98%

A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).

CVSS 3.1 Base Score 7.8. CVSS Attack Vector: local. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Demo Examples

Use After Free

CWE-416

The following example demonstrates the weakness.


               
}
free(buf3R2);

Use After Free

CWE-416

The following code illustrates a use after free error:


               
}
free(ptr);
logError("operation aborted before commit", ptr);

When an error occurs, the pointer is immediately freed. However, this pointer is later incorrectly used in the logError function.

Overview

Type

Linux

First reported 1 year ago

2023-06-28 20:15:00

Last updated 1 year ago

2023-10-26 20:28:00

Affected Software

Linux Kernel

Canonical Ubuntu Linux 18.04 LTS Edition

18.04

Canonical Ubuntu Linux 14.04 ESM Edition

14.04

Canonical Ubuntu Linux 20.04 LTS Edition

20.04

Canonical Ubuntu Linux 16.04 ESM Edition

16.04

References

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663

https://kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04

https://kernel.dance/0e388fce7aec40992eadee654193cad345d62663

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04

https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef7dfac51d8ed961b742218f526bd589f3900a59

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663

Mailing List, Patch

https://kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04

Patch

https://kernel.dance/0e388fce7aec40992eadee654193cad345d62663

Patch

https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04

Mailing List, Patch

https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59

Patch

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef7dfac51d8ed961b742218f526bd589f3900a59

Mailing List, Patch

https://security.netapp.com/advisory/ntap-20230731-0001/

https://www.debian.org/security/2023/dsa-5480

http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html

https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html

https://security.netapp.com/advisory/ntap-20230731-0001/

Third Party Advisory

https://www.debian.org/security/2023/dsa-5480

Third Party Advisory

http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html

Third Party Advisory, VDB Entry

https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html

Mailing List, Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.