The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-46862

CVE-2023-46862: Linux Kernel Race Condition Vulnerability

CVE-2023-46862 is a race condition flaw in Linux Kernel affecting io_uring that can cause a NULL pointer dereference during SQ thread exit. This article covers technical details, affected versions, and mitigation.

Published: February 4, 2026

CVE-2023-46862 Overview

CVE-2023-46862 is a Null Pointer Dereference vulnerability discovered in the Linux kernel through version 6.5.9. The flaw exists in the io_uring/fdinfo.c file where a race condition between SQ (Submission Queue) thread exit and the io_uring_show_fdinfo function can lead to a NULL pointer dereference, potentially causing a denial of service condition on affected systems.

Critical Impact

Local attackers with low privileges can exploit this race condition to cause system instability or denial of service by triggering a NULL pointer dereference during io_uring fdinfo operations.

Affected Products

  • Linux Kernel versions through 6.5.9
  • Systems utilizing io_uring subsystem functionality
  • Debian-based distributions (see Debian LTS Announcement)

Discovery Timeline

  • October 29, 2023 - CVE-2023-46862 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-46862

Vulnerability Analysis

This vulnerability stems from a race condition in the Linux kernel's io_uring subsystem. The io_uring_show_fdinfo function in io_uring/fdinfo.c can encounter a NULL pointer when accessing SQ thread data while the SQ thread is concurrently exiting. This timing-sensitive bug requires precise race condition exploitation but can be triggered by local users with limited privileges.

The io_uring subsystem is a high-performance asynchronous I/O interface in the Linux kernel. When reading fdinfo (file descriptor information) for an io_uring instance, the kernel attempts to retrieve CPU and PID information from the associated SQ thread. Without proper synchronization, this operation can race against the SQ thread's exit path, resulting in access to freed or NULL memory.

Root Cause

The root cause is inadequate synchronization when accessing SQ thread data structures during fdinfo retrieval. The original code did not properly lock the SQ thread while retrieving thread CPU/PID information, creating a window where the SQ thread could exit and deallocate its data structures before the fdinfo operation completed.

Attack Vector

The attack vector is local, requiring an attacker to have low-privilege access to the system. The attacker must be able to:

  1. Create an io_uring instance with an associated SQ thread
  2. Trigger concurrent access to the fdinfo interface while manipulating the SQ thread lifecycle
  3. Win the race condition to cause the NULL pointer dereference

The high attack complexity reflects the difficulty of reliably winning this race condition.

c
 __cold void io_uring_show_fdinfo(struct seq_file *m, struct file *f)
 {
 	struct io_ring_ctx *ctx = f->private_data;
-	struct io_sq_data *sq = NULL;
 	struct io_overflow_cqe *ocqe;
 	struct io_rings *r = ctx->rings;
 	unsigned int sq_mask = ctx->sq_entries - 1, cq_mask = ctx->cq_entries - 1;

Source: GitHub Linux Commit Record

Detection Methods for CVE-2023-46862

Indicators of Compromise

  • Kernel panic or oops messages referencing io_uring_show_fdinfo in the call stack
  • System crashes or unexpected reboots in environments heavily utilizing io_uring
  • Kernel logs showing NULL pointer dereference in io_uring/fdinfo.c

Detection Strategies

  • Monitor kernel logs for NULL pointer dereference exceptions related to io_uring components
  • Implement kernel crash dump analysis to identify exploitation attempts
  • Track processes accessing /proc/[pid]/fdinfo/ for io_uring file descriptors with unusual patterns
  • Deploy kernel-level monitoring for race condition exploitation signatures

Monitoring Recommendations

  • Enable kernel crash reporting and analysis tools such as kdump
  • Monitor system stability metrics for unexpected kernel crashes
  • Review audit logs for suspicious io_uring usage patterns
  • Configure alerting for kernel oops events involving io_uring subsystem

How to Mitigate CVE-2023-46862

Immediate Actions Required

  • Update the Linux kernel to a patched version that includes commit 7644b1a1c9a7ae8ab99175989bfc8676055edb46
  • Apply security patches from your distribution vendor (e.g., Debian LTS updates)
  • Consider temporarily disabling io_uring functionality if patching is not immediately possible
  • Restrict local user access on systems running vulnerable kernels

Patch Information

The vulnerability has been addressed in the Linux kernel through commit 7644b1a1c9a7ae8ab99175989bfc8676055edb46. The fix adds proper locking of the SQ thread while retrieving thread CPU/PID information in the io_uring_show_fdinfo function. This ensures that the SQ thread cannot exit while its data is being accessed.

Relevant patch resources:

  • GitHub Linux Commit Record
  • Kernel Bugzilla ID #218032
  • Debian LTS Announcement

Workarounds

  • Disable io_uring system-wide by setting io_uring_disabled sysctl parameter on supported kernel versions
  • Restrict io_uring access using seccomp filters to limit which processes can use the subsystem
  • Limit local user access to reduce the attack surface for local privilege exploitation
bash
# Disable io_uring system-wide (requires kernel support)
echo 2 > /proc/sys/kernel/io_uring_disabled

# Verify io_uring is disabled
cat /proc/sys/kernel/io_uring_disabled

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRace Condition

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score4.7

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-476
  • Technical References
  • Debian LTS Announcement
  • Vendor Resources
  • Kernel Bugzilla ID #218032

  • GitHub Linux Commit Record
  • Related CVEs
  • CVE-2026-31740: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31751: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31726: Linux Kernel Race Condition Vulnerability

  • CVE-2026-31700: Linux Kernel Race Condition Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English