Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-39198

Опубликовано: 17 нояб. 2023
Источник: msrc
CVSS3: 6.4
EPSS Низкий

Описание

Kernel: qxl: race condition leading to use-after-free in qxl_mode_dumb_create()

EPSS

Процентиль: 0%
0.00008
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 лет назад

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

CVSS3: 7.5
redhat
около 2 лет назад

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

CVSS3: 7.5
nvd
около 2 лет назад

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

CVSS3: 7.5
debian
около 2 лет назад

A race condition was found in the QXL driver in the Linux kernel. The ...

CVSS3: 7.5
github
около 2 лет назад

A race condition was found in the QXL driver in the Linux kernel. The qxl_mode_dumb_create() function dereferences the qobj returned by the qxl_gem_object_create_with_handle(), but the handle is the only one holding a reference to it. This flaw allows an attacker to guess the returned handle value and trigger a use-after-free issue, potentially leading to a denial of service or privilege escalation.

EPSS

Процентиль: 0%
0.00008
Низкий

6.4 Medium

CVSS3