vulnerability

Ubuntu: (Multiple Advisories) (CVE-2023-21400): Linux kernel vulnerabilities

Severity
7
CVSS
(AV:L/AC:L/Au:M/C:C/I:C/A:C)
Published
Jul 13, 2023
Added
Aug 31, 2023
Modified
Aug 18, 2025

Description

In multiple functions of io_uring.c, there is a possible kernel memory corruption due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.

Solutions

ubuntu-upgrade-linux-image-5-15-0-1026-gkeopubuntu-upgrade-linux-image-5-15-0-1031-nvidiaubuntu-upgrade-linux-image-5-15-0-1031-nvidia-lowlatencyubuntu-upgrade-linux-image-5-15-0-1036-ibmubuntu-upgrade-linux-image-5-15-0-1036-raspiubuntu-upgrade-linux-image-5-15-0-1038-intel-iotgubuntu-upgrade-linux-image-5-15-0-1040-gcpubuntu-upgrade-linux-image-5-15-0-1040-gkeubuntu-upgrade-linux-image-5-15-0-1040-kvmubuntu-upgrade-linux-image-5-15-0-1041-oracleubuntu-upgrade-linux-image-5-15-0-1043-awsubuntu-upgrade-linux-image-5-15-0-1045-azureubuntu-upgrade-linux-image-5-15-0-1045-azure-fdeubuntu-upgrade-linux-image-5-15-0-82-genericubuntu-upgrade-linux-image-5-15-0-82-generic-64kubuntu-upgrade-linux-image-5-15-0-82-generic-lpaeubuntu-upgrade-linux-image-5-15-0-82-lowlatencyubuntu-upgrade-linux-image-5-15-0-82-lowlatency-64kubuntu-upgrade-linux-image-5-4-0-1048-iotubuntu-upgrade-linux-image-5-4-0-1058-xilinx-zynqmpubuntu-upgrade-linux-image-5-4-0-1085-ibmubuntu-upgrade-linux-image-5-4-0-1098-bluefieldubuntu-upgrade-linux-image-5-4-0-1122-raspiubuntu-upgrade-linux-image-5-4-0-1126-kvmubuntu-upgrade-linux-image-5-4-0-1137-oracleubuntu-upgrade-linux-image-5-4-0-1139-awsubuntu-upgrade-linux-image-5-4-0-1142-gcpubuntu-upgrade-linux-image-5-4-0-1143-azureubuntu-upgrade-linux-image-5-4-0-205-genericubuntu-upgrade-linux-image-5-4-0-205-generic-lpaeubuntu-upgrade-linux-image-5-4-0-205-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-aws-lts-20-04ubuntu-upgrade-linux-image-aws-lts-22-04ubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-cvmubuntu-upgrade-linux-image-azure-fde-lts-22-04ubuntu-upgrade-linux-image-azure-lts-20-04ubuntu-upgrade-linux-image-azure-lts-22-04ubuntu-upgrade-linux-image-bluefieldubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-gcp-lts-20-04ubuntu-upgrade-linux-image-gcp-lts-22-04ubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-18-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-gke-5-15ubuntu-upgrade-linux-image-gkeopubuntu-upgrade-linux-image-gkeop-5-15ubuntu-upgrade-linux-image-ibmubuntu-upgrade-linux-image-ibm-lts-20-04ubuntu-upgrade-linux-image-intelubuntu-upgrade-linux-image-intel-iotgubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-64kubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04ubuntu-upgrade-linux-image-lowlatency-hwe-18-04ubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-nvidiaubuntu-upgrade-linux-image-nvidia-lowlatencyubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oem-20-04bubuntu-upgrade-linux-image-oem-20-04cubuntu-upgrade-linux-image-oem-20-04dubuntu-upgrade-linux-image-oem-osp1ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-oracle-lts-20-04ubuntu-upgrade-linux-image-oracle-lts-22-04ubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-hwe-18-04ubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon-hwe-18-04ubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-18-04ubuntu-upgrade-linux-image-virtual-hwe-20-04ubuntu-upgrade-linux-image-xilinx-zynqmp

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.