Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-2235

Опубликовано: 15 мар. 2023
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.

The Linux kernel's Performance Events subsystem has a use-after-free flaw that occurs when a user triggers the perf_group_detach and remove_on_exec functions simultaneously. This flaw allows a local user to crash or potentially escalate their privileges on the system.

Отчет

The Red Hat Enterprise Linux 8.4 version is not affected by this flaw, as the vulnerable code was introduced in later versions of the Linux Kernel and was not backported to older releases.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelNot affected
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2023:454108.08.2023
Red Hat Enterprise Linux 8kernelFixedRHSA-2023:451708.08.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportkernelFixedRHSA-2023:562710.10.2023
Red Hat Enterprise Linux 9kernelFixedRHSA-2023:372321.06.2023
Red Hat Enterprise Linux 9kernel-rtFixedRHSA-2023:370821.06.2023
Red Hat Enterprise Linux 9kpatch-patchFixedRHSA-2023:370521.06.2023
Red Hat Enterprise Linux 9kernelFixedRHSA-2023:372321.06.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2192589kernel: use-after-free vulnerability in the perf_group_detach function of the Linux Kernel Performance Events

EPSS

Процентиль: 1%
0.00013
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 лет назад

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.

CVSS3: 7.8
nvd
около 2 лет назад

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.

CVSS3: 7.8
msrc
около 2 лет назад

Описание отсутствует

CVSS3: 7.8
debian
около 2 лет назад

A use-after-free vulnerability in the Linux Kernel Performance Events ...

CVSS3: 7.8
github
почти 2 года назад

A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.

EPSS

Процентиль: 1%
0.00013
Низкий

7.8 High

CVSS3