Bug 2203054 (CVE-2023-2598) - CVE-2023-2598 kernel: io_uring out-of-bounds access to physical memory
Summary: CVE-2023-2598 kernel: io_uring out-of-bounds access to physical memory
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2023-2598
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2211100 2211101
Blocks: 2196300
TreeView+ depends on / blocked
 
Reported: 2023-05-11 06:31 UTC by Rohit Keshri
Modified: 2023-05-30 14:13 UTC (History)
44 users (show)

Fixed In Version: kernel 6.4-rc1
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.
Clone Of:
Environment:
Last Closed: 2023-05-11 11:13:12 UTC
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2023-05-11 06:31:56 UTC
A vulnerability in the fixed buffer registration code for io_uring
(io_sqe_buffer_register in io_uring/rsrc.c) allows out-of-bounds access
to physical memory beyond the end of the buffer. This can be used to
achieve full local privilege escalation.

The vulnerable code landed in 6.3-rc1 with commit 57bebf807e2a
("io_uring/rsrc: optimise registered huge pages")¹.

A fix has been committed upstream for 6.4-rc1 in commit 776617db78c6
("io_uring/rsrc: check for nonconsecutive pages")². The fix has also
been staged³ for 6.3.2.

Reference:
https://www.openwall.com/lists/oss-security/2023/05/08/3

Comment 1 Rohit Keshri 2023-05-11 06:39:47 UTC
There was no shipped kernel version were seen affected with this problem. These files are not built in our source code.

Comment 4 Product Security DevOps Team 2023-05-11 11:13:09 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-2598


Note You need to log in before you can comment on or make changes to this bug.