
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-52439 is a use-after-free vulnerability discovered in the Linux kernel's uio_open functionality. The vulnerability was disclosed on February 20, 2024, affecting multiple versions of the Linux kernel from 4.18 through 6.7.1. This security flaw exists in the User I/O (UIO) subsystem of the Linux kernel (NVD).
The vulnerability occurs in the uio_open function where a race condition exists between core-1 and core-2 operations. In core-1's uio_unregister_device(), the device_unregister will free the idev structure when the idev->dev kobject reference count is 1. However, between core-1's device_unregister and put_device operations, core-2 may execute get_device, leading to a use-after-free condition. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (HIGH) with the vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).
When successfully exploited, this vulnerability can lead to disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). The high CVSS score indicates significant potential impact on system confidentiality, integrity, and availability (NetApp Security).
The issue has been fixed in the Linux kernel through a patch that modifies the handling of device references in the UIO subsystem. The fix involves getting idev atomic & incrementing idev reference with minor_lock to prevent the race condition. Multiple Linux distributions have released security updates to address this vulnerability (Kernel Patch).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."