Unrated severityNVD Advisory· Published Jun 28, 2023· Updated Mar 5, 2025
Use after free in io_uring in the Linux Kernel
CVE-2023-3389
Description
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.
Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer.
We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).
Affected products
92- osv-coords91 versionspkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/dtb-aarch64&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-64kb&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-azure&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-debug&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-default-base&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-default&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-docs&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-kvmsmall&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-obs-build&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-obs-qa&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-rt_debug&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-rt&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-source-azure&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-source&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-source-rt&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-syms-azure&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-syms&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-syms-rt&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/kernel-zfcpdump&distro=openSUSE%20Leap%2015.5pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-64kb&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Legacy%2015%20SP5pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP5pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP4-RT_Update_9&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4pkg:rpm/suse/kernel-livepatch-SLE15-SP5-RT_Update_3&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-livepatch-SLE15-SP5_Update_1&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP5pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP4pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Real%20Time%20Module%2015%20SP5pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP4pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2015%20SP5pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP5pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP4pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Real%20Time%20Module%2015%20SP5pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/kernel-zfcpdump&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5
< 5.14.21-150400.24.69.1+ 90 more
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.14.55.1
- (no CPE)range: < 5.14.21-150500.33.6.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1.150400.24.31.1
- (no CPE)range: < 5.14.21-150500.55.7.1.150500.6.2.5
- (no CPE)range: < 5.14.21-150400.24.69.1.150400.24.31.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150400.14.55.1
- (no CPE)range: < 5.14.21-150500.33.6.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.14.55.1
- (no CPE)range: < 5.14.21-150500.33.6.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.14.55.1
- (no CPE)range: < 5.14.21-150500.33.6.1
- (no CPE)range: < 5.14.21-150400.24.69.1.150400.24.31.1
- (no CPE)range: < 5.14.21-150400.24.69.1.150400.24.31.1
- (no CPE)range: < 5.14.21-150400.24.69.1.150400.24.31.1
- (no CPE)range: < 5.14.21-150500.55.7.1.150500.6.2.5
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 1-150400.1.3.1
- (no CPE)range: < 1-150400.9.3.1
- (no CPE)range: < 1-150500.11.5.1
- (no CPE)range: < 1-150500.11.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.14.55.1
- (no CPE)range: < 5.14.21-150500.33.6.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.14.55.1
- (no CPE)range: < 5.14.21-150500.33.6.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
- (no CPE)range: < 5.14.21-150400.15.40.1
- (no CPE)range: < 5.14.21-150500.13.11.1
- (no CPE)range: < 5.14.21-150400.24.69.1
- (no CPE)range: < 5.14.21-150500.55.7.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/mitrepatch
- git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/mitrepatch
- git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mitrepatch
- packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.htmlmitre
- kernel.dance/0e388fce7aec40992eadee654193cad345d62663mitre
- kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04mitre
- kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59mitre
- lists.debian.org/debian-lts-announce/2023/10/msg00027.htmlmitre
- security.netapp.com/advisory/ntap-20230731-0001/mitre
- www.debian.org/security/2023/dsa-5480mitre
News mentions
0No linked articles in our index yet.