CVE-2023-1295
📋 TL;DR
A time-of-check to time-of-use (TOCTOU) vulnerability in the Linux kernel's io_uring subsystem allows a local user to escalate privileges to root. This affects Linux kernel versions 5.6 through 5.11. The vulnerability exists in the IORING_OP_CLOSE operation where race conditions can be exploited.
💻 Affected Systems
- Linux kernel
📦 What is this software?
H300s by Netapp
H410c by Netapp
H410s by Netapp
H500s by Netapp
H700s by Netapp
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full root privileges, compromising the entire system and potentially accessing all data and resources.
Likely Case
Local user with existing access escalates to root, enabling installation of persistent malware, data exfiltration, or lateral movement.
If Mitigated
With proper access controls and monitoring, impact is limited to the compromised user's scope, but root access still poses significant risk.
🎯 Exploit Status
Exploitation requires local access and race condition triggering. Proof-of-concept code has been published in security advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commit 9eac1904d3364254d622bf2c771c4f85cd435fc2 or later
Vendor Advisory: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93
Restart Required: Yes
Instructions:
1. Update Linux kernel to version 5.12 or later. 2. For affected stable branches (5.10, 5.11), apply backported patch 788d0824269bef539fe31a785b1517882eafed93. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable io_uring module
linuxPrevent loading of the vulnerable io_uring subsystem
echo 'blacklist io_uring' >> /etc/modprobe.d/blacklist-io_uring.conf
update-initramfs -u
reboot
Restrict user access
allLimit local user accounts and implement strict access controls
🧯 If You Can't Patch
- Implement strict user access controls and monitor for privilege escalation attempts
- Deploy security monitoring tools to detect exploitation patterns and unauthorized root access
🔍 How to Verify
Check if Vulnerable:
Check kernel version: uname -r. If version is between 5.6 and 5.11 inclusive, system is vulnerable.
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is 5.12+ or check for patch commit in kernel source: grep -q '9eac1904d3364254d622bf2c771c4f85cd435fc2' /proc/version_signature
📡 Detection & Monitoring
Log Indicators:
- Unusual privilege escalation events in audit logs
- Multiple failed IORING_OP_CLOSE operations
- Unexpected root user activity from non-privileged accounts
Network Indicators:
- None - this is a local exploit
SIEM Query:
source="audit.log" AND (event_type="SYSCALL" AND syscall="io_uring_enter" AND result="-EPERM") OR (user="root" AND source_user!="root")
🔗 References
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9eac1904d3364254d622bf2c771c4f85cd435fc2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb
- https://kernel.dance/788d0824269bef539fe31a785b1517882eafed93
- https://kernel.dance/9eac1904d3364254d622bf2c771c4f85cd435fc2
- https://security.netapp.com/advisory/ntap-20230731-0006/
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9eac1904d3364254d622bf2c771c4f85cd435fc2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb
- https://kernel.dance/788d0824269bef539fe31a785b1517882eafed93
- https://kernel.dance/9eac1904d3364254d622bf2c771c4f85cd435fc2
- https://security.netapp.com/advisory/ntap-20230731-0006/