
Cloud Vulnerability DB
A community-led vulnerabilities database
A use-after-free vulnerability (CVE-2023-0469) was discovered in the Linux Kernel's iouring subsystem, specifically in the ioinstallfixedfile function within io_uring/filetable.c during call cleanup. The vulnerability was disclosed on January 26, 2023, affecting specific versions of the Linux kernel (Ubuntu Security, NVD).
The vulnerability is a use-after-free flaw that occurs during the cleanup process of the ioinstallfixedfile function in the iouring subsystem. The issue manifests when -ENOMEM occurs during the calling of ioinstallfixed_file(). The vulnerability has been assigned a CVSS 3 Severity Score of 5.5 (Medium) (Ubuntu Security).
This vulnerability could potentially lead to a denial of service (system crash) or, in some cases, allow for arbitrary code execution by local attackers (Ubuntu Security).
The vulnerability has been fixed in various Linux kernel versions. Ubuntu has released patches for affected versions, including fixes in kernel version 5.19.0-38.39 for Ubuntu 22.10 (kinetic) and several other kernel variants. The fix was also included in Linux kernel 6.1-rc7 (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."