- Description
- In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return). This can lead to a potential use-after-free when the completion via io_rw_done runs at separate context.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-416
- Hype score
- Not currently trending
CVE-2023-52926 (CVSS:7.8, HIGH) is Awaiting Analysis. In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provid..https://t.co/gT2rnFcs9c #cybersecurityawareness #cybersecurity #CVE #infosec #hacker #nvd #mitre
@cracbot
28 Feb 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2023-52926 ❓ 🏢 Linux - Linux 🏗️ 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 🔗 https://t.co/XPXQhru427 🔗 https://t.co/pqjKvv3Sml 🔗 https://t.co/vheRUVENHq #CyberCron #VulnAlert https://t.co/onZ1nkgXNf
@cybercronai
24 Feb 2025
66 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
(CVE-2023-52926)[io_uring/rw]UAF when the completion via io_rw_done runs at separate context https://t.co/qMtdBdqWas
@xvonfers
24 Feb 2025
290 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2023-52926 In the Linux kernel, the following vulnerability has been resolved: IORING_OP_READ did not correctly consume the provided buffer list when read i/o returned < 0 (exc… https://t.co/qcQl4ZPfxo
@CVEnew
24 Feb 2025
492 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D0B62FCA-92A9-4AC3-923F-F1275F7ABE20",
"versionEndExcluding": "6.1.122",
"versionStartIncluding": "5.1"
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "74BA9823-CCED-4B24-815D-B82543954BF8",
"versionEndExcluding": "6.6.68",
"versionStartIncluding": "6.2"
}
],
"operator": "OR"
}
]
}
]