In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.
The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and behaviors.
Link | Tags |
---|---|
https://source.android.com/security/bulletin/pixel/2023-07-01 | vendor advisory |
http://www.openwall.com/lists/oss-security/2023/07/14/2 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/07/19/2 | mailing list third party advisory exploit |
http://www.openwall.com/lists/oss-security/2023/07/19/7 | third party advisory mailing list |
http://www.openwall.com/lists/oss-security/2023/07/25/7 | mailing list |
https://www.debian.org/security/2023/dsa-5480 | third party advisory |
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html | third party advisory vdb entry |
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20240119-0012/ |