In the Linux kernel, the following vulnerability has been resolved:
IORING_OP_READ did not correctly consume the provided buffer list when
read i/o returned < 0 (except for -EAGAIN and -EIOCBQUEUED return).
This can lead to a potential use-after-free when the completion via
io_rw_done runs at separate context.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-24 09:15
Updated : 2025-11-03 21:16
NVD link : CVE-2023-52926
Mitre link : CVE-2023-52926
CVE.ORG link : CVE-2023-52926
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
