A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-5912-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5935-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-5938-1 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-5941-1 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-5962-1 | Linux kernel (Intel IoTG) vulnerabilities |
Ubuntu USN |
USN-6024-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-6071-1 | Linux kernel (OEM) vulnerabilities |
Ubuntu USN |
USN-6072-1 | Linux kernel (OEM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 01 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-04-01T15:06:39.092Z
Reserved: 2023-01-24T00:00:00.000Z
Link: CVE-2023-0468
Updated: 2024-08-02T05:10:56.179Z
Status : Modified
Published: 2023-01-26T21:18:09.347
Modified: 2025-04-01T15:15:57.597
Link: CVE-2023-0468
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN