{"uuid": "15dc5da2-8f1e-4265-a825-7925bb0f3e6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2236", "type": "seen", "source": "https://t.me/cibsecurity/63123", "content": "\u203c CVE-2023-2236 \u203c\n\nA use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.Both\u00c2\u00a0io_install_fixed_file\u00c2\u00a0and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-01T16:29:27.000000Z"}