
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2023-0468) was discovered in the Linux Kernel's iouring subsystem, specifically in the iopollcheckevents function within iouring/poll.c. The vulnerability was identified on January 24, 2023, and stems from a race condition involving pollrefs that could potentially lead to a NULL pointer dereference (NVD, Ubuntu Security).
The vulnerability occurs due to a race condition in the iopollcheckevents() function when concurrently running with the poll cancel routine iopollcancelreq(). The issue manifests in a use-after-free scenario and can result in a NULL pointer dereference. The vulnerability has been assigned a CVSS v3.1 base score of 4.7 (Medium) with the vector string CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H, indicating local access requirements and high attack complexity (NVD, Red Hat Bugzilla).
The vulnerability can lead to system instability through NULL pointer dereference, potentially causing system crashes or denial of service conditions. The impact is limited to local attacks and requires high attack complexity to exploit (NVD).
The vulnerability was fixed in Linux Kernel 6.1 RC7 through two commits that address the race condition. The fixes were implemented through patches a26a35e9019fd70bf3cf647dcfdae87abc7bacea and 12ad3d2d6c5b0131a6052de91360849e3e154846 (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."