CVE-2023-52926

In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return). This can lead to a potential use-after-free when the completion via io_rw_done runs at separate context.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

24 Mar 2025, 17:34

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/6c27fc6a783c8a77c756dd5461b15e465020d075 - () https://git.kernel.org/stable/c/6c27fc6a783c8a77c756dd5461b15e465020d075 - Patch
References () https://git.kernel.org/stable/c/72060434a14caea20925e492310d6e680e3f9007 - () https://git.kernel.org/stable/c/72060434a14caea20925e492310d6e680e3f9007 - Patch
References () https://git.kernel.org/stable/c/a08d195b586a217d76b42062f88f375a3eedda4d - () https://git.kernel.org/stable/c/a08d195b586a217d76b42062f88f375a3eedda4d - Patch
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux linux Kernel
Linux

25 Feb 2025, 17:15

Type Values Removed Values Added
Summary
  • (es) Se ha resuelto una vulnerabilidad en el kernel de Linux consistente en que la operación IORING_OP_READ no consumia correctamente la lista de buffers proporcionada cuando la lectura de entrada salida devolvía un valor &lt; 0 (excepto los casos en que devolvía -EAGAIN y -EIOCBQUEUED). Esto puede llevar a un potencial uso después de liberar memoria cuando el completado via io_rw_done se ejecuta en un contexto separado.
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

24 Feb 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-24 09:15

Updated : 2025-03-24 17:34


NVD link : CVE-2023-52926

Mitre link : CVE-2023-52926

CVE.ORG link : CVE-2023-52926


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free