CVE-2023-2235
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
01/05/2023
Last modified:
25/08/2023
Description
A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.<br />
<br />
The perf_group_detach function did not check the event&#39;s siblings&#39; attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.<br />
<br />
We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.<br />
<br />
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.13 (including) | 5.15.104 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.2.8 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



