Bug 2222087 (CVE-2023-21400) - CVE-2023-21400 kernel: io_uring: io_defer_entry object double free vulnerability
Summary: CVE-2023-21400 kernel: io_uring: io_defer_entry object double free vulnerability
Keywords:
Status: NEW
Alias: CVE-2023-21400
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2222099 2222100
Blocks: 2222077
TreeView+ depends on / blocked
 
Reported: 2023-07-11 18:30 UTC by Mauro Matteo Cascella
Modified: 2023-07-25 15:04 UTC (History)
49 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A double-free vulnerability was found in the io_uring subsystem in the Linux kernel. This issue may allow a malicious local user to crash the kernel or elevate their privileges on the system.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Mauro Matteo Cascella 2023-07-11 18:30:39 UTC
A double free vulnerability was found in io_uring, affecting the Linux kernel 5.10. Nicolas Wu and Ye Zhang were able to exploit this flaw with Dirty Pagetable to bypass all the mitigation techniques deployed on the latest Google Pixel 7 and achieve local privilege escalation.

References:
https://source.android.com/docs/security/bulletin/pixel/2023-07-01
https://yanglingxi1993.github.io/dirty_pagetable/dirty_pagetable.html
https://www.openwall.com/lists/oss-security/2023/07/14/2

Comment 3 guazhang@redhat.com 2023-07-13 00:33:15 UTC
Hi,

Any reproducer here or test steps, and how to verify the bug in RHEL ?

Comment 4 Mauro Matteo Cascella 2023-07-16 10:14:38 UTC
Hi,

> Any reproducer here or test steps, and how to verify the bug in RHEL ?

No reproducer available and vulnerability details are not yet public (see references in comment 0).

Comment 6 Mauro Matteo Cascella 2023-07-25 15:04:12 UTC
The "Dirty Pagetable" article has been updated with exploit information. As for the fix, see https://www.openwall.com/lists/oss-security/2023/07/25/9.

Upstream commit:
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=fb348857e7b67eefe365052f1423427b66dedbf3


Note You need to log in before you can comment on or make changes to this bug.