CVE-2023-0468
CVSS V2 None
CVSS V3 None
Description
A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.
Overview
- CVE ID
- CVE-2023-0468
- Assigner
- secalert@redhat.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-01-26T21:18:09
- Last Modified Date
- 2023-02-01T15:59:27
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 1 | OR | 6.1 | |
cpe:2.3:o:linux:linux_kernel:6.1:-:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:* | 1 | OR |
References
Reference URL | Reference Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2164024 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-0468 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0468 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-26 23:17:37 | Added to TrackCVE | |||
2023-01-27 15:14:57 | 2023-01-27T14:03:31 | CVE Modified Date | updated | |
2023-01-27 15:14:57 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-02-01 15:14:10 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-02-01 16:15:39 | 2023-02-01T15:59:27 | CVE Modified Date | updated | |
2023-02-01 16:15:39 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-02-01 16:15:40 | Weakness Enumeration | new | ||
2023-02-01 16:15:43 | CPE Information | updated |